Getting Data In

Scripted input not showing up in search results

oreoshake
Communicator

env[home] = linux, centos, splunk 4.0.11, everything on one test box

cat /opt/splunk/etc/apps/unix/bin/uname.sh

#!/bin/sh 
uname -a

cat etc/apps/unix/local/inputs.conf

[script:///opt/splunk/etc/apps/unix/bin/uname.sh]
disabled = false
index = os
interval = 30
sourcetype = uname

I've set the interval pretty low just to get the script to execute but it isn't working. File permissions are 755 on that file and other scripted inputs work fine. Any ideas? Any logs to check?

Also, if I search _internal for per_sourcetype_thruput, entries for this sourcetype are returning non-zero values so Splunk is doing something with it...

There are no errors related the file not existing or not being under $SPLUNK_HOME...

0 Karma
1 Solution

Lowell
Super Champion

Hmmm, what timerange are you running your search for?

When I run uname -a I get the following output:

Linux linuxbox2 2.6.24-27-server #1 SMP Mon Feb 22 19:42:25 UTC 2010 i686 GNU/Linux

Make sure you are preventing that kernel build time from being picked up as your event's timestamp. I believe you can do that with the following props.conf entry:

[uname]
DATETIME_CONFIG = CURRENT

View solution in original post

Lowell
Super Champion

Hmmm, what timerange are you running your search for?

When I run uname -a I get the following output:

Linux linuxbox2 2.6.24-27-server #1 SMP Mon Feb 22 19:42:25 UTC 2010 i686 GNU/Linux

Make sure you are preventing that kernel build time from being picked up as your event's timestamp. I believe you can do that with the following props.conf entry:

[uname]
DATETIME_CONFIG = CURRENT

oreoshake
Communicator

Thanks, facepalm

0 Karma

oreoshake
Communicator

I was including index=os, the command runs fine, and no errors were returned in that search. Hmm.

0 Karma

Lowell
Super Champion

Any errors reported with this search? index="_internal" ExecProcessor sourcetype="splunkd" ERROR

0 Karma

gkanapathy
Splunk Employee
Splunk Employee

If you just log in as the Splunk user and run the script using $SPLUNK_HOME/bin/splunk cmd /opt/splunk/etc/apps/unix/bin/uname.sh, does it produce the output you expect? Is the os index specifically being searched?

0 Karma

Genti
Splunk Employee
Splunk Employee

how do you know it is not working? - ie. what is your search query that gives you this impression?
basically, make sure that index=os is part of your search, otherwise you might not see it (if youre just doing a search on sourcetype=uname)

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

What Is Splunk? Here’s What You Can Do with Splunk

Hey Splunk Community, we know you know Splunk. You likely leverage its unparalleled ability to ingest, index, ...

Level Up Your .conf25: Splunk Arcade Comes to Boston

With .conf25 right around the corner in Boston, there’s a lot to look forward to — inspiring keynotes, ...

Manual Instrumentation with Splunk Observability Cloud: How to Instrument Frontend ...

Although it might seem daunting, as we’ve seen in this series, manual instrumentation can be straightforward ...