

The path to the root certificate and Common Name is specified using an HTTPS The instance is installed locally on the same machine on which the Both options add additional fields to the attributes of aīelow is an example of the logging options specified for the Splunk Enterprise

A regular expression to match logging-related environment variables. Used for advanced log tag options.Ĭomma-separated list of keys of environment variables, which should be included in message, if these variables are specified for container. A regular expression to match logging-related labels. Refer to the log tag option documentation for customizing the log tag format.Ĭomma-separated list of keys of labels, which should be included in message, if these labels are specified for container.
#SPLUNK INPUTS.CONF DOCS DRIVER#
To configure the splunk driver across the Docker environment, editĭaemon.json with the key, "log-opts": (12 characters of the container ID).The following properties let you configure the splunk logging driver.
#SPLUNK INPUTS.CONF DOCS WINDOWS#
Set up Windows management instrumentation (WMI) inputs.Įnable or disable admission rules in workload management.Ĭonfigure workload pools (compute and memory resource groups) that you can assign to searches in workload management.Ĭonfigure workload rules to define access and priority for workload pools in workload management.Docker run -log-driver=splunk -log-opt splunk-token=VALUE -log-opt splunk-url=VALUE. Use this file to set up UI views (such as charts). List the visualizations that an app makes available to the system. Includes changing the default earliest and latest values for the time range picker. Use in tandem with nf.Ĭhange UI preferences for a view. Machine-generated file that stores source type learning rules.Įnable apps to collect telemetry data about app usage and other properties.ĭefine custom time ranges for use in the Search app.Īdd additional transaction types for transaction search.Ĭonfigure regex transformations to perform on data inputs. Terms to ignore (such as sensitive data) when creating a source type.
#SPLUNK INPUTS.CONF DOCS HOW TO#
For example, the file includes settings for enabling SSL, configuring nodes of an indexer cluster or a search head cluster, configuring KV store, and setting up a license manager.ĭefine deployment server classes for use with deployment server.Ĭonfigure how to seed a deployment client with apps at start-up time. Also, map transforms to event properties.ĭefine a custom client of the deployment server.ĭefine ordinary reports, scheduled reports, and alerts.Ĭontains a variety of settings for configuring the overall state of a Splunk Enterprise instance. Set indexing property configurations, including timezone offset, custom source type rules, and pattern collision priorities. Maintain the credential information for an app. Set attribute/value pairs for metric rollup policy entries.Ĭonfigure extraction rules for table-like events (ps, netstat, ls). Set various limits (such as maximum result size or concurrent real-time searches) for search commands.Ĭustomize the text, such as search error strings, displayed in Splunk Web. This can be handy, for example, when identifying forwarders for internal searches. Set the default thresholds for proactive Splunk component monitoring.ĭesignate and manage settings for specific instances of Splunk. Specify behavior for clients of the deployment server.Ĭreate multivalue fields and add search capability for indexed fields.ĭisplay a global banner on all pages in Splunk Web.

Set permissions for objects in a Splunk app.
Toggle between Splunk's built-in authentication or LDAP, and configure LDAP.Ĭonfigure roles, including granular access controls.Ĭustomize monitoring console health check.Ĭonnect search commands to any custom search script] using in the Developer Guide on the Developer Portal.Īttribute/value pairs for configuring data models.This feature is not available for this release. See How to edit a configuration file.Ĭonfigure auditing and event hashing.

Contact Support before editing a conf file that does not have an accompanying spec or example file.ĭo not edit the default copy of any conf file in $SPLUNK_HOME/etc/system/default/. Some conf files do not have spec or example files. The following is a list of some of the available spec and example files associated with each conf file.
