TY 4 that...when I run that first command it returns just north of 2.5 million events and 17 statistics. So I see bandwidth, cpu, df, df_metric, exec, interfaces, iostat, lsof, netstat, openPorts, package, protocol, ps, top, uptime, vmstat, and who. For all of these, the sourcetype = source with one exception. Exec is broken out to 3 .sh files in a splunkforwarder folder structure. I do not know if this is correct or not. For instance, I discovered there is a fields link within Settings and I can get to Field Alisases, trim the list to "oracle" and I see stuff reporting from Oracle Audit, Oracle Database, Oracle Listener, Oracle Instance, Oracle Session, Oracle SysPerf, etc... My understanding is the Splunk Index (this is a file?) is used by Splunk in searching for Keywords (are these fields?). Thus, if the index contains ONLY the source / sourcetype information, then I'm gold and I simply need to define what those 17 stats are actually from/ for. However, I also know that cannot be true as I can search on a Host=<something> which is not in that list. I do hope that makes sense.
... View more