icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.
Log4Shell Vulnerability: Information and guidance for you. Get resources.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Confluence Audit Log Ingester
SHA256 checksum (confluence-audit-log-ingester_100.tgz) a48bb369f1d1a8ecb8ee8b7251119963be002203742874d88bb9652425c54309
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Confluence Audit Log Ingester

This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
Confluence Audit Log Ingester can pull a variety of audit log information from Confluence's Organizations REST API. More information about the API can be found at https://developer.atlassian.com/cloud/admin/organization/rest/intro/#about

Description

Addon to pull audit information from Confluence's Organization REST API
Built for Splunk Enterprise 8.0.0 or higher
Ready for Enterprise Security

Constraints / Requirements

  • The app can be installed on a forwarder or a search head (in the case of Cloud Victoria Experience).
  • API keys and Org IDs can vary across the type of audit logs, so each input will need to have a separate Org ID and API key entered.
  • This is a single script instance modular input. This means that the interval parameter will only be read from the default stanza in inputs.conf, and any intervals configured under user added stanzas will be ignored. See https://docs.splunk.com/Documentation/Splunk/latest/AdvancedDev/ModInputsSpec#single_script_instance_mode for more information.

INSTALLATION AND CONFIGURATION

Installation Instructions

  1. Install the app on a forwarder or search head, depending on your environment configuration.
  2. Configure your input under the Inputs tab. Org ID and API key's are required for each input
  3. The default sourcetype is confluence:audit

New features

Version 1.0.0 is the initial release

Fixed issues

None

Known issues

None

Third-party software attributions

DEV SUPPORT

Release Notes

Version 1.0.0
May 23, 2022

Initial release


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.