Hello,
I installed SA-nix, splunk_app_for_nix, Splunk_TA_nix for indexing all my Linux host system data.
I have several questions about these three apps/add-ons
Where I do I put my local inputs.conf and local indexes.conf ?
SA-nix/local/[inputs.conf | indexes.conf ]
splunk_app_for_nix/local/[inputs.conf | indexes.conf ]
splunk_app_for_nix/install/SA-nix/local/[inputs.conf | indexes.conf ]
splunk_app_for_nix/install/Splunk_TA_nix/local/[inputs.conf | indexes.conf ]
Splunk_TA_nix/local/[inputs.conf | indexes.conf ]
Which changes can it make according to these different locations of my inputs.conf or indexes.conf?
Web interface of Splunk App For Unix
In the settings parameters, I have configured my Linux Index(es) to contain Linux host data.
Example:
index=os
index=sys_linux (which has all my linux syslog indexed with sourcetype=syslog)
In this logic, Splunk App For Unix can display only all events in these indexes ...
But in Metrics/Hosts tab, I can see Cisco events from other hosts which has been indexing in another index (index=net_cisco) and another sourcetype (sourcetype=cisco:ios)
I don't understand why my Splunk App For Unix can display the information/events which from another index that doesn't concern Linux data.
Any help is appreciated, thank you
Marie
... View more