AWS S3 Splunk CII Integration_orig
2025.08.27
Overview
To establish an integration between Splunk and Cisco Identity Intelligence, please refer to the setup guide section in this document. This integration method utilizes the Splunk Add-on for AWS to ingest log data from your AWS S3 bucket. This method is frequently employed for batch processing of historical or high-volume log data. It requires setting up AWS credentials and the accurate specification of the SQS queue region and URL.
Prerequisites
Before you begin, please ensure you have the following:
Administrative access to your Cisco Identity Intelligence
Administrative access to your Splunk Enterprise or Splunk Cloud
The Cisco Security Cloud application installed from Splunkbase
The Splunk Add-on for AWS application installed from Splunkbase
Appropriate permissions to manage AWS S3 buckets and Splunk data inputs
Setup Guide
Create an S3 Bucket
Go to the Amazon S3 console
Click Create bucket
Provide a name for the bucket, such as โsplunk-cii-demo-set-up"for this example
Click Create bucket to complete the process
Create an IAM Policy
Navigate to IAM > Policies > Create Policy

b. Select JSON in the policy editor and paste the following JSON, where you will Replace ${BUCKET_NAME}
with a name of your choosing, such as splunk-cii-set-up
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:PutObject"
],
"Resource": "arn:aws:s3:::${BUCKET_NAME}/*"
}
]
}
Last updated