What's new in Splunk App for Infrastructure
These release notes apply to the Splunk App for Infrastructure version 1.3.0.
For compatibility information, see System Requirements for Splunk App for Infrastructure.
New features
New feature or enhancement | Description |
---|---|
Splunk Cloud compatibility | Deploy the Splunk App for Infrastructure in your managed Splunk Cloud environment. To get started, contact your Splunk Sales representative or Splunk Support. For more information, see Install the Splunk App for Infrastructure in a Splunk Cloud deployment. |
Easy removal script | Run the easy removal script to stop data collection and remove the data collection agents from a host. For more information, see Run the easy removal script. |
Group-centric alerting | View alerts for groups in the Alerts tab. When you create a group alert, and an entity in the group triggers the alert, the group will display under the Group view. If you split by a host-identifying dimension and one entity in the group triggers the group alert, it still displays an alert for the single entity. For more information, see Create an alert. |
Index filtering in the Analysis Workspace | Internal indexes do not display under the Events section of the Data panel in the Analysis Workspace. Optionally, you can edit the sai_events_indexes search macro to modify which indexes are included under Settings > Advanced Search > Search macros.
|
User telemetry | The Splunk App for Infrastructure collects usage data to improve performance. The following data is collected:
For more information, see Share data in Splunk App for Infrastructure. |
Authenticated installation for collectd | Optionally, include the signing key for the collectd repository when the easy install script installs collectd on these operating systems:
For more information, see Configure Linux/Unix Data Collection for Splunk App for Infrastructure. |
Power role permissions | Power users have the ability to:
Fore more information, see Admin and user roles in Splunk App for Infrastructure. |
What's new in the docs
Topic | Description |
---|---|
Install the Splunk App for Infrastructure in a distributed deployment | Updated deployment requirements. A heavy forwarder is not shared as a requirement to send data from Linux, Windows, or Mac OS X systems to the Splunk App for Infrastructure anymore. |
Send collectd data to a local universal forwarder | If you are sending data to the Splunk App for Infrastructure from a *nix host, you can configure collectd to send metrics data to the local universal forwarder on the host. |
How the easy install script works in Splunk App for Infrastructure | Describes what the easy install script does, and how it works for each operating system. |
Configure AWS data collection for Splunk App for Infrastructure | Updated information about AWS tags you can add as custom dimensions in the Splunk App for Infrastructure. |
collectd package sources, install commands, and locations | Describes the collectd source package locations and install commands. |
Fixed issues for Splunk App for Infrastructure |
This documentation applies to the following versions of Splunk® App for Infrastructure (Legacy): 1.3.0
Feedback submitted, thanks!