
Configure inputs in the Splunk Add-on for Microsoft IIS
Configure directory monitoring inputs on your data collection node for Microsoft IIS logs. Your forwarders must be installed directly on your Microsoft IIS servers or have the Microsoft IIS log files copied or shared to them from the Microsoft IIS servers. You can configure inputs directly on your forwarders or you can configure inputs on a deployment server and push them to your forwarders.
Configure inputs using Splunk Web
- Log in to Splunk Web.
- Click Settings > Data inputs.
- Click Files & directories.
- Click New.
- In the File or Directory field, specify the path to the Microsoft IIS standard log directory (default:
%SystemDrive%\inetpub\logs\LogFiles
) or advanced log directory (default:%SystemDrive%\inetpub\logs\AdvancedLogs
), then click Next. - In the Sourcetype field, enter the Microsoft IIS source type that matches the field extraction you plan to use.
ms:iis:auto
enables automatic index-time field extraction. Supports Splunk recommended MS IIS fields if enabled.ms:iis:default
enables search-time field extraction.ms:iis:default:85
enables search-time field extraction. Preferable for MS IIS version 8.5 and greater.ms:iis:splunk
enables search-time field extraction for Splunk recommended fields MS IIS.
- Click Review and review the information.
- If all the information is correct, click Submit.
Next step
Configure the log format to allow extractions using the ms:iis:default
, ms:iis:default:85
or ms:iis:splunk
sourcetype. See Configure field transformations for the Splunk Add-on for Microsoft IIS.
Configure inputs using the configuration files
- Create
$SPLUNK_HOME/etc/apps/Splunk_TA_microsoft-iis/local/inputs.conf
. - Depending on the IIS source type and field extraction method you want to use, add one of the following stanzas, replacing the default IIS log directory path name with the actual value in your environment and the value for index where you want to collect data into.
Index-time field extraction:[monitor://C:\inetpub\logs\LogFiles] disabled = false sourcetype = ms:iis:auto index = <preferred index>
Search-time field extraction:
[monitor://C:\inetpub\logs\LogFiles] disabled = false sourcetype = [ ms:iis:default | ms:iis:default:85 | ms:iis:splunk ] index = <preferred index>
- Save the file.
- Restart the Splunk platform for the new inputs to take effect.
PREVIOUS Install the Splunk Add-on for Microsoft IIS |
NEXT Configure field transformations in the Splunk Add-on for Microsoft IIS |
This documentation applies to the following versions of Splunk® Supported Add-ons: released
Feedback submitted, thanks!