THOR Add-on v2

Splunk Community

THOR Add-on v2

THOR Add-on v2
The THOR Add-on contains all event types, field extractions, transforms, tags and lookups for the THOR Splunk App. If you use Splunk as a simple Syslog Receiver you have to install the new THOR Add-on and the new THOR App on that system. If you use Splunk Forwarders to collect your data, you can now deploy the THOR Add-on on the Forwarders with the Deployment Manager and the lightweight THOR App on the Search Head. Steps to get data into the Splunk App: Use sourcetype='thor' for all your inputs (files/udp/tcp) Recommendation: Create an index named 'thor' and add this index to the base event type definition (Settings > Event Types > 'thor_events'): sourcetype=thor AND index=thor
0 topics and 0 replies mentioned THOR Add-on v2 in
Latest Topics
No posts to display.
Latest Replies
No posts to display.
Top Topics
No posts to display.
My Topics
No posts to display.