Get started with getting data in
To get started with getting data into your Splunk deployment, point it at some data by configuring an input. There are several ways to do this. The easiest way is to use Splunk Web.
After you configure the inputs or enable an app, your Splunk deployment stores and processes the specified data. You can go to either the Search app or the main app page and begin exploring the data that you collected.
- To learn how to configure an input, see Configure your inputs.
- To learn how to add data to your Splunk deployment, see How do you want to add data?.
- To learn how to experiment with adding a test index, see Use a test index.
- To learn about how to add source types, see "The Set Sourcetype page."
- To learn what event processing is and how to configure it, see How Splunk software handles your data.
- To learn how to delete data from your Splunk deployment, see Delete indexed data and start over.
- To learn about how to configure your inputs with a default index, see Point your inputs at the default index.
Add new inputs
Here is a high-level procedure for adding data.
- Understand your needs. Ask the following questions.
- What kind of data do I want to index? See What data can I index?.
- Is there an app for that? See Use apps to get data in.
- Where does the data reside? Is it local or remote? See Where is my data?
- Should I use forwarders to access remote data? See Use forwarders to get data in.
- What do I want to do with the indexed data? See What is Splunk knowledge? in the Knowledge Manager Manual.
- Create a test index and add a few inputs. Any data you add to your test index counts against your maximum daily indexing volume for licensing purposes.
- Preview and modify how your data will be indexed before committing the data to the test index.
- Review the test data that you have added with the Search app:
- Do you see the sort of data you were expecting?
- Did the default configurations work well for your events?
- Is data missing or mangled?
- Are the results optimal?
- If necessary, tweak your input and event processing configurations further until events look the way you want them to.
- Delete the data from your test index and start over, if necessary.
- When you are ready to index the data permanently, configure then inputs to use the default main index.
You can repeat this task to add other inputs as you familiarize yourself with the getting data in process.
Index custom data
Splunk software can index any time-series data, usually without additional configuration. If you have logs from a custom application or device, process it with the default configuration first. If you do not get the results you want, you can tweak things to make sure the software indexes your events correctly.
What data can I index?
Is my data local or remote?
This documentation applies to the following versions of Splunk® Enterprise: 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.3.8, 6.3.9, 6.3.10, 6.3.11, 6.3.12, 6.3.13, 6.3.14, 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5, 6.4.6, 6.4.7, 6.4.8, 6.4.9, 6.4.10, 6.4.11, 6.5.0, 6.5.1, 6.5.1612 (Splunk Cloud only), 6.5.2, 6.5.3, 6.5.4, 6.5.5, 6.5.6, 6.5.7, 6.5.8, 6.5.9, 6.5.10, 6.6.0, 6.6.1, 6.6.2, 6.6.3, 6.6.4, 6.6.5, 6.6.6, 6.6.7, 6.6.8, 6.6.9, 6.6.10, 6.6.11, 6.6.12, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.13, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.10, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 8.0.0, 8.0.1