Hi - we would like to know how does Splunk App for VMware works, I have read the documents but there is some confusion.
Does the Splunk forwarder that needs to be installed on vCenter collects the logs of vCenter only or all the logs of all ESXi hosts? If not, how do we collect the ESXi logs? By sending to syslog port ? We like to see logs that shows information related to storage paths, latency etc. How much burden it will be in vCenter or in Splunk ? Also like some feedback from someone who is using it? Is it easy or hard to configure?
Whether one is using the Splunk App for VMware, or the VMware integration into Splunk IT Service intelligence, one typically looks at three different sources of data. The storage paths, latency, and performance data is in the third data source listed below. You also mentioned the ESXi and vCenter logs, so I'm listing what is - and is not - in those log files.
ESXi logs
vCenter logs
vSphere API data
Hi @jmajumdar - Looks like you got some great answers; did they help you to understand how this app works? If so, don't forget to resolve this post by clicking "Accept" below the best answer and up voting. If not, please provide a comment with more information. Thank you!
Hello,
You can read more about collection configuration here:
http://docs.splunk.com/Documentation/AddOns/released/VMW/Collectionconfiguration#Change_collection_i...
The Splunk App for VMware, through installation and configuration of the Splunk Add-on for VMware, uses the VMware API to collect data about your virtual environment. The Splunk Add-on for VMware communicates with your vCenter Server using network ports and Splunk management ports. The Distributed Collection Scheduler (DCS), for example, uses port 443 to connect to the vCenter Server to verify that the vCenter Server credentials are valid. It also uses this port to discover the number of managed ESXi hosts in the environment.
Splunk Add-on for VMware accepts ESXi log data using syslogs by installing "Splunk_TA_esxilogs" on your ESXi log forwarder. You can do this by deploying a Splunk platform forwarder, such as the Splunk OVA for VMware. When you use a forwarder to collect ESXi logs, the Splunk platform is the default log repository. Alternatively, a syslog server with a Splunk platform forwarder monitoring logs would work.
To configure ESXi log data collection, identify the machine to use as your data collection point. Verify that the ESXi hosts can forward data to that data collection point.
You can learn more about this process here: http://docs.splunk.com/Documentation/AddOns/released/VMW/Collectoptionallogdata
You can also see the memory and general system requirements by following this link: http://docs.splunk.com/Documentation/VMW/3.3.0/Installation/Platformandhardwarerequirements
Please let me know if you have any questions about this process, and I'll see what I can do to drill into some deployment-specific scenarios.
Whether one is using the Splunk App for VMware, or the VMware integration into Splunk IT Service intelligence, one typically looks at three different sources of data. The storage paths, latency, and performance data is in the third data source listed below. You also mentioned the ESXi and vCenter logs, so I'm listing what is - and is not - in those log files.
ESXi logs
vCenter logs
vSphere API data