Configure HTTP Event Collector secure connection
Splunk ships with self-signed certificates by default, so most production deployments need to tell Collectord either how to trust those certs or how to use your own. The relevant knobs all live under [output.splunk] in the configuration.
Configure trusted SSL connection to the self-signed certificate
If you’re sticking with Splunk’s self-signed certificate, copy the server CA from $SPLUNK_HOME/etc/auth/cacert.pem and bake it into the image alongside Collectord’s config.
A minimal config that accepts the license, points at HEC, and trusts the self-signed CA looks like this. The caName is the common name on Splunk’s default self-signed cert — SplunkServerDefaultCert:
1[general]
2acceptLicense = true
3
4[output.splunk]
5url = https://hec.example.com:8088/services/collector/event/1.0
6token = B5A79AAD-D822-46CC-80D1-819F80D7BFB0
7caPath = /config/cacert.pem
8caName = SplunkServerDefaultCertLayer the config and the CA onto the base image:
1FROM outcoldsolutions/collectorfordocker:26.04.1
2
3COPY 002.conf /config/002.conf
4COPY cacert.pem /config/cacert.pemRun the resulting image following the installation guide and Collectord will talk to HEC over a fully verified TLS connection.
HTTP Event Collector incorrect index behavior
HEC rejects events whose target index isn’t on the token’s allow-list — and once you start overriding indexes via annotations, it’s easy to typo a name or forget to enable a new index on the token. Collectord lets you choose how to react with incorrectIndexBehavior:
RedirectToDefault— the default. Re-routes the rejected event to the token’s default index so nothing is lost.Drop— drops the event outright. Use this when you’d rather see gaps in Splunk than have unrouted events polluting the default index.Retry— keeps retrying. Useful only when you can fix the index on the Splunk side quickly — otherwise the affected pipeline (for example, process stats) will stall for the entire host.
1[general]
2acceptLicense = true
3
4[output.splunk]
5url = https://hec.example.com:8088/services/collector/event/1.0
6token = B5A79AAD-D822-46CC-80D1-819F80D7BFB0
7incorrectIndexBehavior = DropBuild the image with the embedded configuration:
1FROM outcoldsolutions/collectorfordocker:26.04.1
2
3COPY 002.conf /config/002.confRun it following the installation guide.
Using proxy for HTTP Event Collector
If your network forces outbound traffic through a proxy, point Collectord at it with proxyUrl. When the proxy itself terminates TLS, bake its CA into the image too:
1[general]
2acceptLicense = true
3
4[output.splunk]
5url = https://hec.example.com:8088/services/collector/event/1.0
6token = B5A79AAD-D822-46CC-80D1-819F80D7BFB0
7proxyUrl = http://proxy.example:4321
8caPath = /config/proxie-ca.pemBuild the image with the embedded configuration:
1FROM outcoldsolutions/collectorfordocker:26.04.1
2
3COPY 002.conf /config/002.conf
4COPY proxie-ca.pem /config/proxie-ca.pemRun it following the installation guide.
Using multiple HTTP Event Collector endpoints for Load Balancing and Fail-over
When you have several HEC endpoints — typically a heavy forwarder pool or a dedicated indexer cluster — you can list them all and let Collectord spread the load and survive failures. A “failure” here means a connection error or any HTTP status >= 500.
You get three selection algorithms:
random— pick a random URL on first send and after every failure.round-robin— start at the first URL and advance one position on every failure.random-with-round-robin— pick a random URL on first send, then round-robin from there on every failure. This is the default.
1[general]
2acceptLicense = true
3
4[output.splunk]
5urls.0 = https://hec1.example.com:8088/services/collector/event/1.0
6urls.1 = https://hec2.example.com:8088/services/collector/event/1.0
7urls.2 = https://hec3.example.com:8088/services/collector/event/1.0
8
9urlSelection = random-with-round-robin
10
11token = B5A79AAD-D822-46CC-80D1-819F80D7BFB0Build the image with the embedded configuration:
1FROM outcoldsolutions/collectorfordocker:26.04.1
2
3COPY 002.conf /config/002.confRun it following the installation guide.
Enable indexer acknowledgement
By default, HEC tells Collectord a payload was accepted as soon as it lands on the receiver — not when it’s actually persisted to an indexer. If you need stronger delivery guarantees, turn on Indexer acknowledgment on the token and on Collectord. It does cost throughput — every payload now waits for the index to confirm — so enable it only where the guarantee matters.
1[general]
2acceptLicense = true
3
4[output.splunk]
5url = https://hec.example.com:8088/services/collector/event/1.0
6ackUrl = https://hec.example.com:8088/services/collector/ack
7token = B5A79AAD-D822-46CC-80D1-819F80D7BFB0
8ackEnabled = true
9ackTimeout = 3mBuild the image with the embedded configuration:
1FROM outcoldsolutions/collectorfordocker:26.04.1
2
3COPY 002.conf /config/002.confRun it following the installation guide.
Client certificates for collector
If your HEC endpoint requires mTLS, embed the client certificate and key in the image and point Collectord at them:
1[general]
2acceptLicense = true
3
4[output.splunk]
5url = https://hec.example.com:8088/services/collector/event/1.0
6token = B5A79AAD-D822-46CC-80D1-819F80D7BFB0
7clientCertPath = /config/client-cert.pem
8clientKeyPath = /config/client-cert.keySupport for multiple Splunk clusters
When the same Docker host needs to forward to more than one Splunk cluster — say, a primary indexing tier and a separate tier for a security team — define a named output alongside the default:
1[output.splunk::prod1]
2url = https://prod1.hec.example.com:8088/services/collector/event/1.0
3token = AF420832-F61B-480F-86B3-CCB5D37F7D0DAnything not specified on the named output falls back to settings on output.splunk.
You can then send specific containers to the secondary cluster with an annotation like collectord.io/output=splunk::prod1.