Monitor First In, First Out (FIFO) queues
This topic describes how to configure a First In, First Out (FIFO) input by editing the
inputs.conf file on a forwarder instance (Splunk Web does not currently support the definition of FIFO inputs.)
Note: Data that you send over FIFO queues does not remain in computer memory and can be an unreliable method for data sources. To ensure data integrity, use the monitor input instead.
Add a FIFO input to inputs.conf
To add a FIFO input, add a stanza for it to the inputs.conf file in
$SPLUNK_HOME/etc/system/local/ or your own custom application directory in
If you have not worked with configuration files before, read About Configuration Files in the Splunk Enterprise Admin manual before you begin.
This input stanza configures the forwarder to read from a FIFO queue at the specified path.
[fifo://<path>] <attribute1> = <val1> <attribute2> = <val2> ...
You can use the following attributes with FIFO stanzas:
|| The host key/field to a static value for this stanza. The
Sets the host key's initial value. This key is used during parsing and indexing to set the host field. It also uses the host field at search time.
|The IP address or fully qualified domain name of the host where the data originated|
|| The index where events from this input will be stored. The
|| The sourcetype key/field for events from this input. Explicitly declares the source type for this data, as opposed to letting it be determined automatically. This is important both for searchability and for applying the relevant formatting for this type of data during parsing and indexing.
Sets the sourcetype key's initial value. This value is used during parsing and indexing to set the source type field. It is also the source type field used at search time.
|Splunk software picks a source type based on various aspects of the data. There is no hard-coded default.|
|| Sets the source key/field for events from this input. The
Do not override the source field unless absolutely necessary. The input layer provides a more accurate string to aid in problem analysis and investigation, accurately recording the file from which the data was retreived. Consider use of source types, tagging, and search wildcards before overriding this value.
|The input file path.|
|| Where the input processor should deposit the events that it reads.
Set to "parsingQueue" to apply
| Defaults to |
Troubleshoot HTTP Event Collector
Monitor changes to your file system
This documentation applies to the following versions of Splunk Cloud™: 7.1.3, 7.1.6, 7.2.3, 7.2.4, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 8.0.0