Install the Splunk Add-on for VMware in an on-premises environment
The Splunk Add-on for VMware performs several data collection and enrichment tasks. This guide takes you through installing the Splunk Add-on for VMware and its prerequisite add-ons in preparation for configuring data collection.
- Upload the Splunk_TA_vmware and SA-Hydra packages from Splunk Add-on for VMware to the data collection nodes.
- Upload the Splunk_TA_vmware and SA-Hydra packages from Splunk Add-on for VMware to the data collection scheduler.
- Upload the packages from the in Splunk Add-on for VMware Indexes, Splunk Add-on for vCenter Logs, Splunk Add-on for VMware ESXi Logs add-ons to the indexer(s).
- Add the packages from the Splunk Add-on for vCenter Logs, Splunk Add-on for VMware ESXi Logs, and Splunk Add-on for VMware Extractions to the search head(s).
- Add add-on components to forwarders (for log collection).
- Create a distributed collection scheduler. Data collection for VMware requires complex job management for connecting to and polling data from your environment. The scheduler is a Splunk component used to manage data collection jobs between your data collection nodes.
This table outlines a distributed deployment installation of the Splunk Add-on for VMware and its prerequisite add-ons. For single deployments, all components have to be installed on your single Splunk platform instance. The Splunk Add-on for VMware can't be installed using Splunk Web.
Splunkbase | Component | Search head | Scheduler (DCS) | Indexer | Data Collection Node (DCN) | Dedicated ESXi log forwarder | Dedicated vCenter log forwarder |
---|---|---|---|---|---|---|---|
Splunk Add-on for VMware | Splunk_TA_vmware
|
X | X | ||||
Splunk Add-on for ESXi Logs | Splunk_TA_esxilogs | X | X | X | |||
Splunk Add-on for vCenter Logs | Splunk_TA_vcenter | X | X | Optional* | X | ||
Splunk Add-on for VMware Indexes | SA-VMWIndex | X | |||||
Splunk Add-on for VMware Extractions | TA-VMW-FieldExtractions | X |
(*)Depending on your specific configuration, you might also need Splunk_TA_vcenter to collect VCenter data.
Upload the Splunk Add-on for VMware to your Data Collection Nodes
If this is an upgrade from a previous version of The Splunk Add-on for VMware, see the following steps. Otherwise, you will need to configure data collection nodes to connect to and poll data from your VMware vCenters. Steps for setting up a Data Collection node can be found here
- Stop your Splunk platform instance on each of your DCNs.
- Upload Splunk_TA_vmware and SA-Hydra to each of your DCNs.
- Restart your Splunk platform instance each of your DCNs.
Upload the prerequisite add-on for Splunk Add-on for VMware to your search heads
If you are installing the Splunk Add-on for VMware on a search head cluster in a distributed deployment, you have to use a dedicated scheduler. To deploy the add-ons listed below, follow the guidance in Install an add-on in a distributed Splunk Enterprise deployment.
- Stop your Splunk platform instance.
- If you are using a search head cluster, extract the packages Splunk Add-on for VMware ESXi Logs (Splunk_TA_esxilogs), Splunk Add-on for vCenter Logs (Splunk_TA_vcenter), and Splunk Add-on for VMware Extractions (TA-VMW-FieldExtractions) from Splunkbase to $SPLUNK_HOME/etc/shcluster/apps/ on the deployer.
- If you are not using a search head cluster, extract and upload the Splunk Add-on for VMware ESXi Logs (Splunk_TA_esxilogs), Splunk Add-on for vCenter Logs (Splunk_TA_vcenter), and Splunk Add-on for VMware Extractions (TA-VMW-FieldExtractions) packages from Splunkbase to $SPLUNK_HOME/etc/apps.
Note: No packages from Splunk Add-on for VMware are required on the search head.
- Restart your Splunk platform instance.
Note: The Hydra troubleshooting dashboards are now part of the Splunk Add-on for VMware Extractions. So, the SA-Hydra package isn't required on the search head for v4.0.3.
Update the default character count limitations for the search commands
The Splunk Add-on for VMware collects the VMware infrastructure inventory data. Because inventory data can have a much higher length for the collected JSON data, it might exceed the default length limit of 5000 characters. Complete the following steps to change the character length limit:
For search head cluster deployments
- Create a new file with the name limits.conf in the
$SPLUNK_HOME/etc/shcluster/apps/TA-VMW-FieldExtractions/local
directory on the deployer. - Add the following stanza to the limits.conf file:
[spath] # number of characters to read from an XML or JSON event when auto extracting extraction_cutoff = 20000 extract_all = true
- Push the app bundle from the deployer. The deployer restarts all the search head cluster members after the upgrade is applied. If the deployer does not restart the search head cluster members, perform a rolling restart.
For dedicated search head deployments
- Create a new file with the name limits.conf in the
$SPLUNK_HOME/etc/apps/TA-VMW-FieldExtractions/local
directory on the search head. - Add the following stanza to the limits.conf file:
[spath] # number of characters to read from an XML or JSON event when auto extracting extraction_cutoff = 20000 extract_all = true
- Restart the Splunk instance.
Upload the prerequisite add-on for Splunk Add-on for VMware to your indexer cluster deployment
- Enable maintenance mode on indexer master node.
- Download and extract the components of the Splunk Add-on for VMware Indexes (SA-VMWIndex), the Splunk Add-on for VMware ESXi Logs (Splunk_TA_esxilogs), and the Splunk Add-on for vCenter Logs (Splunk_TA_vcenter) to etc/master-apps on indexer master node.
- Restart indexer master node.
- Push configuration bundle from indexer master node.
Upload the prerequisite add-on for the Splunk Add-on for VMware to non-clustered indexer(s)
- Stop your Splunk indexer instance.
- Download and extract the components of the Splunk Add-on for VMware Indexes (SA-VMWIndex), the Splunk Add-on for VMware ESXi Logs (Splunk_TA_esxilogs), and the Splunk Add-on for vCenter Logs (Splunk_TA_vcenter) to etc/apps.
- Restart your Splunk indexer instance.
Upload the prerequisite add-on for the Splunk Add-on for VMware to forwarders
Collect logs from VMware vCenter and ESXi hosts by sending them through an intermediate forwarder or directly to your Splunk indexers.
Skip this step if you are forwarding logs directly to Splunk indexers from your ESXi hosts and vCenter Servers.
- Stop the forwarder
- On forwarder, under splunkforwarder/etc/apps, upgrade Splunk Add-on for VMware ESXi Logs(Splunk_TA_esxilogs) and Splunk Add-on for vCenter Logs(Splunk_TA_vcenter).
- The new add-on package includes props.conf and inputs.conf changes for vclogs, so user must update
/local
directory with these two files and enable the appropriate stanzas. - Make sure under etc/system/local/output.conf, server entries to forward logs to your indexer(s) are present.
- Restart the forwarder
Upload Splunk Add-on for VMware to your scheduler
The scheduler is the instance of Splunk that manages connections to the Data Collection Nodes and manages data collection jobs across your DCNs and vCenters. For production environments the scheduler should not be on the same search head as your VMware App. We recommend using a license server, distributed management console or a stand alone Splunk instance as your scheduler.
- Stop Scheduler.
- Collection configuration UI is now present in TA VMware: upload Splunk_TA_vmware and SA-Hydra to
etc/apps
. - Start the scheduler.
Set up your system for the Splunk Add-on for VMware | Configure the Splunk Add-on for VMware to collect data |
This documentation applies to the following versions of Splunk® Supported Add-ons: released
Feedback submitted, thanks!