Install the Splunk App for Infrastructure in a single-instance deployment
The single-instance Splunk Enterprise deployment serves as both the search head and the indexer. Install the Splunk Add-on for Infrastructure on the same instance of Splunk Enterprise on which you install the Splunk App for Infrastructure (SAI). If you install the Splunk Add-on for AWS, also install it on the same instance.
If you want to integrate VMware vCenter Servers in SAI, you have to install additional components. For more information, see Install VMware data collection add-ons and dependencies.
Steps
Follow these steps to get started with SAI in a single-instance deployment. In addition to installing SAI, these steps show you how to install the Splunk Add-on for Infrastructure, install the Splunk Add-on for AWS, and configure the receiving port for your instance.
1. Install SAI
Follow these steps to install the app.
- In Splunk Web, go to Apps > Find More Apps.
- Search for Splunk App for Infrastructure.
- Select Install and follow the prompt.
- Restart Splunk Enterprise.
2. Install the Splunk Add-on for Infrastructure
Follow these steps to install the Splunk Add-on for Infrastructure. When you install the add-on, it creates the em_metrics
, em_meta
, and infra_alerts
indexes. For more information about the source types and components that the add-on configures, see Source types and components for the Splunk Add-on for Infrastructure.
For more information, see Splunk Add-on for Infrastructure.
- In Splunk Web, go to Apps > Find More Apps.
- Search for Splunk Add-on for Infrastructure.
- Select Install and follow the prompt.
- Restart Splunk Enterprise.
3. (Optional) Install the Splunk Add-on for AWS
If you want to collect AWS Cloudwatch data from your AWS accounts, follow these steps to install the Splunk Add-on for AWS. Version 5.0.0 is supported.
For more information, see About the Splunk Add-on for Amazon Web Services.
- In Splunk Web, go to Apps > Find More Apps.
- Search for Splunk Add-on for AWS.
- Select Install and follow the prompt.
- Restart Splunk Enterprise.
3. Configure the receiving port
Enable receiving on the TCP port for logs and metrics data collection.
- In Splunk Web, log in as an administrator.
- Click Settings > Forwarding and receiving.
- Click Configure receiving. If your Splunk Enterprise instance is not already listening on port 9997, or is not listening to another port you plan to use, click New Receiving Port. If you are already listening on port 9997, go to the next step.
- Specify the TCP port you want the receiver to listen on (the receiving port, also known as the listening port). The recommended port is
9997
. For example, if you enter9997
, the receiver listens for connections from forwarders on port 9997. You can specify any unused port. You can use a tool likenetstat
to determine what ports are available on your system. Make sure the port you select is not in use by Splunk Web or splunkd. - Click Save. Splunk software starts listening for incoming data on the port you specified.
SAI compatibility with related apps and add-ons | Install the Splunk App for Infrastructure in a distributed deployment |
This documentation applies to the following versions of Splunk® App for Infrastructure (Legacy): 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.1.0, 2.1.1 Cloud only
Feedback submitted, thanks!