Getting Data In

Unable to add more sources to Universal Forwarder

yossefn
Path Finder

Hi,

I'm pretty new in the Splunk field.
I've installed a little environment of Splunk on virtual machine and Universal Forwarder on my own machine (both are windows).
When I'm trying to add more sources to the Forwarder such as log file, I can see the changes in the App's inputs.conf file but there are now events getting in to the system. I did a restart to the splunkd service on my machine and didn't help.
What I'm missing here?

0 Karma

HiroshiSatoh
Champion

Can I search Forwarder's system log?
If you can not find it, it's a problem with the network or outputs.conf.
If you can search it is a problem with inputs.conf.
Mistakes in setting, differences in character codes, etc. can be assumed.

0 Karma

davpx
Communicator

would you mind posting the inputs.conf stanza you are using?

yossefn
Path Finder

Hi davpx,

Here is what I have in the inputs.conf file under "C:\Program Files\Splunk\etc\system\local"
This is the one you're looking for?

[default]
host = S0011
index = mypc

0 Karma

skoelpin
SplunkTrust
SplunkTrust

You should check out /opt/splunkforwarder/var/log/splunk/splunkd.log for errors

yossefn
Path Finder

Hi skoelpin,

The attached error are appears many times in the splunkd.log file

ERROR KVStorageProvider - An error occurred during the last operation ('saveBatchData', domain: '11', code: '22'): Cannot do an empty bulk write

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...