| Sending Cloudmersive Private Cloud Virus Scan API Scan Result Logs to Splunk | 
		| 6/9/2025 - Cloudmersive Support | 
		| Customers can send Cloudmersive Virus Scan API scan logs to Splunk.  This enables customers to view threat detections easily in Splunk.  This is in addition to operational logs. Requirements: 
The Splunk instance must be reachable on the network from your Cloudmersive Private Cloud serversYour Splunk instance must have an HTTP Event Collector configured on either HTTPS (recommended) or HTTPYou must create a Splunk Access Token for Cloudmersive Private Cloud to connect to your serverCloudmersive Private Cloud will directly connect to Splunk's HTTP Event Collector over HTTPS or HTTP so there is no need for the Splunk Universal ForwarderThe Cloudmersive Private Cloud server does not need to be restarted to enable logging To enable this, follow these steps: 
Navigate to the Cloudmersive Management Portaland click onPrivate Cloud; select the relevant Cloudmersive Private Cloud node.  We recommend starting with pre-production nodes firstClick on Configure Nodeand thenAdvanced ConfigurationEnable Log Virus Scan Outcomes to Splunk' and provide theSplunk URLto your Splunk HTTP Event Collector, which should look something like this:https://mydomain.splunkcloud.com:8088/services/collector. Also provide the Splunk Access Token. Click onSave Changes`.Click on Push Configurationto push your configuration update in real time to your server. Events should now begin flowing to Splunk.  Generate events by virus scanning a file with the Virus Scan API.  Now check your Splunk Index for events.  Note that there could be an indexing delay as events are received by Splunk prior to them appearing in the index. |