Splunk Search

splunk stream

iherb_0718
Path Finder

Hi

My servers (clients) are running splunk stream.  I believe within the deployment server will contain the configurations that is telling the client what to stream (dns, dhcp, http, etc).  Where can I find this within the deployment server or is it available in a conf file somewhere on the clients?

 

 

Labels (1)
0 Karma
1 Solution

scelikok
SplunkTrust
SplunkTrust

Hi @iherb_0718,

Splunk Stream configurations are managed by Splunk App for Stream. This should be installed on your Search Head/Heads.  On this app, you can go to the "Configuration | Distributed Forwarder Management" menu setup Stream Client groups. Then start required streams from the "Configuration | Configure Streams" menu. You can see documentation below;

https://docs.splunk.com/Documentation/StreamApp/7.3.0/DeployStreamApp/DeploymentArchitecture#How_Spl...

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.

View solution in original post

0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @iherb_0718,

Splunk Stream configurations are managed by Splunk App for Stream. This should be installed on your Search Head/Heads.  On this app, you can go to the "Configuration | Distributed Forwarder Management" menu setup Stream Client groups. Then start required streams from the "Configuration | Configure Streams" menu. You can see documentation below;

https://docs.splunk.com/Documentation/StreamApp/7.3.0/DeployStreamApp/DeploymentArchitecture#How_Spl...

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma
Get Updates on the Splunk Community!

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureThursday, March 27, 2025  |  11AM PST / 2PM EST | Register NowStep boldly ...

Splunk AppDynamics with Cisco Secure Application

Web applications unfortunately present a target rich environment for security vulnerabilities and attacks. ...