diff --git a/docs/en/observability/ingest-splunk.asciidoc b/docs/en/observability/ingest-splunk.asciidoc index 4fe5e1c567..f35902dcc4 100644 --- a/docs/en/observability/ingest-splunk.asciidoc +++ b/docs/en/observability/ingest-splunk.asciidoc @@ -12,7 +12,7 @@ If you haven't already, you need to install {es} for storing and searching your data, and {kib} for visualizing and managing it. For more information, see <>. After {es} and {kib} are installed Fleet must be enabled; see the -https://www.elastic.co/guide/en/fleet/current/fleet-quick-start.html[Fleet quick start]. +{fleet-guide}/fleet-quick-start.html[Fleet quick start]. ===== @@ -40,7 +40,7 @@ The options are the same for Apache, AWS Cloudtrail, and Zeek. [[splunk-step-one]] == Step 1: Add integration -Find the Nginx integration and begin adding it as described in the +Find the Nginx integration and begin adding it as described in the {fleet-guide}/fleet-quick-start.html#add-nginx-integration[Fleet quick start]. [discrete] @@ -139,4 +139,3 @@ dependency on any Splunk processing. these integrations go through the exact same processing as if {agent} had gotten the event from the original source. So the same level of mapping to ECS occurs. -