Hi,
I have a little bit of experience working with Splunk in a Windows environment.
I have been tasked with identifying what the product can do it in a Linux Environment.
A cursory search revealed 3 apps/add-ons:
1) Splunk App for Unix and Linux
2) Splunk Add on for Unix and Linux
3) NMON Performance Monitor for Unix and Linux Systems
I also have very little practical experience with Linux. Could you tell me which I might want to use with Splunk?
My audience wants to know the potential of Splunk to monitor Linux systems in terms of Dashboards and I don't know where to start.
I have one Ubuntu Linux VM to play with.
Thanks!!
Hi infras2sec, The nix addon / app are good places to start for basic OS related inputs and visualizations. Start with the addon, look through the inputs, and create a local inputs.conf with the stanza name for each input as you'd like, and set disabled=0 to override the default disabled=1. You also might want to override the default index assignment, although this has an impact on the saved searched the the visualizations use.
As a note, the nix app takes some study to get put in right, and to be made the most of.
Past the basic /var/log type monitoring, and whatever performance related metrics you are interested in getting (the addon has all this), you can then look at what specific applications you are interested in. Many of these sourcetypes are parsed out of the box. You can find a list here. http://docs.splunk.com/Documentation/Splunk/6.4.2/Data/Listofpretrainedsourcetypes
Apache webserver (and other webservers) come to mind. Past that you'll want to find apps for other specific softwares you're shop is running on linux.
Please let me know if this answers your question!
If I saw an add ons folder I'd have a starting place.