Getting Data In

How do I ingest Linux logs on my indexers?

jrabidoux
Engager

I am running a distributed Splunk environment. I have three indexers, an index master, a search head, and a universal forwarder deployment server. The universal forwarders load balance between the three indexers. I would like to ingest the logs like /var/log/secure/ and /var/log/messages that are on the indexers themselves so I can monitor logins and whatnot on those servers. Can I simply add the log files in question to $SPLUNK_HOME/etc/system/local/inputs.conf, on each indexer or is there a better way to attack indexing Linux logs on the indexers in the cluster?

1 Solution

somesoni2
Revered Legend

You should configure the monitoring configuration, inputs.conf, to a app and deploy that app through the cluster master. See this for more information on distribution of app to indexer cluster peers from cluster master:
http://docs.splunk.com/Documentation/Splunk/6.5.2/Indexer/Updatepeerconfigurations

View solution in original post

somesoni2
Revered Legend

You should configure the monitoring configuration, inputs.conf, to a app and deploy that app through the cluster master. See this for more information on distribution of app to indexer cluster peers from cluster master:
http://docs.splunk.com/Documentation/Splunk/6.5.2/Indexer/Updatepeerconfigurations

jrabidoux
Engager

Perfect! Exactly what I was looking for. Worked like a charm!

Many Thanks!

Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...