I have a set of log files that has to be parsed using python. I Have this file "scriptedfile.py"
As a newbie, I tried going through documentation, especially this link :
But I am not able to follow much of the steps here , especially modifying some "inputs.conf" file. So I'd hope if someone can translate this in some simpler words and tell me the steps to about parsing my log files with the script and then use it for further analysis in Splunk.
In case this helps, I found this In the below path
C:\Program Files\Splunk\etc\system\local, i found an inputs.conf with just two lines :
[default] host = ATA1CJSKCR
Scripted inputs are usually associated with an app rather than the system. It's a good to create a company app for this purpose.
Once you've decided on a location for your script, it's a simple matter to edit the relevant inputs.conf file and insert the following lines. They will cause your script to run every 5 minutes with the output sent to index "foo". You'll want to change the index and sourcetype names and the interval to suit your environment. Restart Splunk after editing the file.
[script:///opt/splunk/etc/app/ourapp/bin/scriptedfile.py] disabled = 0 index = foo interval = 300 sourcetype = bar