
.png)
The problem I'm facing on is that if any of the two third-pary systems goes down. The Splunk Add-on for Unix and Linux does this for you, with several canned scripts and corresponding sourcetypes available.I have a Splunk forwarder which sends events to two third-party systems(through TCP) and also index them into a splunk indexer. In addition to grabbing your existing logs, Splunk can periodically run arbitrary commands and aggregate the output from them. Splunk users are super helpful! You can shoot an email to the Splunk mailing list! I won't claim to be an expert, but you can always hit me (Jeremy) up on jabber directly (jnt6) and I'll see what I can do. Poking around in there can help you track down issues - sometimes. Splunk itself logs in /opt/splunkforwarder/var/log/splunk. You could use wireshark or tcpdump to check this out. Make sure your system is actually trying to send data to the indexers. Note that you have to specify an index! You might want to just start off with the most basic query: "index=*" - that should return some results! You should probably check your search head to see if you're getting any data. You can do lots of other fun things with the CLI, too! My first search You want to see something like: Active forwards: :9997 (ssl) Next, you should get your SSL certs in place. Most distributions will utilize either the RPM or the DEB, but they also have a tarball if you're doing something more esoteric (for example: we have some systems with unwritable /opt filesystems, so we had to build custom packages using the tarball to accommodate this).
#Outputs conf splunk download
Installing the forwarder itself is easy: you can download the Universal Forwarder from the Splunk web site. A URL which you actually use to hit your search head and do searches.An SSL password, used to decrypt your SSL cert.A splunk client certificate, used to authenticate your client against the indexer.An SSL CA certificate, used by your client to verify connections to the Splunk indexer.It is possible to have multiple indexes for your instance, but initially you'll start with a single index (if you need more later on, you should submit a ticket and request them) an " index" to use, which usually corresponds to your department's name.the splunk indexer server:port combination this is what the forwarder will connect to.When you have your departmental instance created, you will be provided with the following information, which you must use to configure your forwarders: If you have your own group which you will use to control access, refer to that group in your ticket.

Access to your Splunk instance is governed by grouper groups (or, I guess, group manager groups?). If you don't have one yet, submit a ticket to the OIT help desk asking for a departmental Splunk instance. In the simplest case, this is probably the search app, which is all this document discusses.īefore you can use Splunk, you need to have that departmental instance.
