Configure AWS Data Collection for Splunk App for Infrastructure
Admin privileges are required to configure data collection.
To collect data and monitor your AWS accounts, add your AWS account information to Splunk App for Infrastructure (SII) and collect data from your entities such as EC2, EBS, ELB, and CloudWatch logs.
Video demonstration
For a video demonstration of configuring AWS data collection, see Video: Configuring AWS collection.
Prerequisites
- If configuring on an on-premises instance, you need your AWS account Name, Key ID, and Secret Key information for Step 1.
- If configuring on an AWS EC2 instance, you need to configure an IAM role for AWS data collection in Step 1.
Steps
Step 1: Connect to your AWS account
For on-premises instances:
- In the Splunk App for Infrastructure user interface, click the Add Data tab.
- In the left panel click AWS.
- Enter your AWS account Name, Key ID, Secret Key, and select a Region Category. Note all fields are required.
- Click Add AWS account.
For AWS EC2 instances:
- In the Splunk App for Infrastructure user interface, click the Add Data tab.
- In the left panel click AWS.
- Attach IAM role. Click the instructions link for directions for how to attach an IAM role needed for AWS data collection, or see Configure Identity and Access Management (IAM) policies for AWS data collection. There can be only one IAM role attached to an instance, and the user interface updates when the IAM role is detected.
- Click Verify IAM role attachment. A green checkmark and an identified IAM detected role display.
Step 2: Collect data from
- Select the AWS Entity Types you want to collect data from.
- Select the AWS Regions that apply.
- Enter Custom Dimensions for troubleshooting, analysis, and filtering hosts.
- Dimensions are key/value pairs that provide meta data about the metric (describes the measurement) used for searching and filtering relevant datasets (distinct time series) during an investigation.
- Use the format of dimension:value, such as location:seattle or role:webserver.
- If you want to collect data from CloudWatch Logs, select Yes and click Add AWS data source.
- When setting up CloudWatch Logs agent configuration in AWS, edit the log stream name (log_stream_name) with a unique name (instance_id) for each log group within the configuration file. This defines the log stream’s identity for correlation of logs to individual instances and metric data. For example:
[/var/log/messages] file = /var/log/messages log_group_name = /var/log/messages log_stream_name = {instance_id}
- Select the region and enter the log file name. Click the Add to add more log files.
- Click Update AWS data source.
Step 3: Once your AWS account is added, verify your data connection
- When a connection is made to your AWS account(s), connected entities display.
- If no new entities are connected after a few minutes, click Refresh.
- When new entities are connected, click New host found to view your entity.
Summary
After you have added your AWS entities, and validate new entities are connected, you can start monitoring your infrastructure. Go to the Investigate page to monitor your entities in the Infrastructure Overview or List View. You can group your entities to monitor them more easily, and drilldown to the Analysis Workspace to further analyze your infrastructure.
Configure Linux Data Collection for Splunk App for Infrastructure | Configure Identity and Access Management (IAM) policy for AWS data collection |
This documentation applies to the following versions of Splunk® App for Infrastructure (Legacy): 1.2.0, 1.2.1, 1.2.2, 1.2.3
Feedback submitted, thanks!