Getting Data In

log file created in launcher and search folder

SplunkCSIT
Communicator

how come when i configured the data in the heavy forwarder, sometimes it will created in launcher folder /etc/apps/launcher/local/inputs.conf, sometime it created in search folder /etc/apps/search/local/inputs.conf. How to resolve those that already created in launcher and move to search folder?thks

Tags (2)
0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

You'll get inputs in the launcher app if you add it from within the launcher app. Functionally it doesn't matter where the input is defined, but for maintenance it's indeed a good idea to consolidate that in one app. For future inputs, make sure you first enter the search app and then add the input. For existing inputs, move the stanza from /etc/apps/launcher/local/inputs.conf to /etc/apps/search/local/inputs.conf and restart.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

You'll get inputs in the launcher app if you add it from within the launcher app. Functionally it doesn't matter where the input is defined, but for maintenance it's indeed a good idea to consolidate that in one app. For future inputs, make sure you first enter the search app and then add the input. For existing inputs, move the stanza from /etc/apps/launcher/local/inputs.conf to /etc/apps/search/local/inputs.conf and restart.

martin_mueller
SplunkTrust
SplunkTrust

Given a choice of those two, I'd pick the search app every time.

As soon as your deployment grows it'll make sense to group inputs into their own apps, and deploy those apps as a whole onto their forwarders.

0 Karma

SplunkCSIT
Communicator

thks, for best practice, we should put the indexes.conf and inputs.conf in launcher folder or search folder?

Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...