Splunk Cloud

Getting Data In

Acrobat logo Download manual as PDF

This documentation does not apply to the most recent version of SplunkCloud. Click here for the latest version.
Acrobat logo Download topic as PDF

Get started with getting data in

To get started with getting data into your Splunk deployment, point it at some data by configuring an input. There are several ways to do this. The easiest way is to use Splunk Web.

Alternatively, you can download and enable an app, such as the Splunk App for Microsoft Exchange or Splunk IT Service Intelligence.

After you configure the inputs or enable an app, your Splunk deployment stores and processes the specified data. You can go to either the Search app or the main app page and begin exploring the data that you collected.

Add new inputs

Here is a high-level procedure for adding data.

  1. Understand your needs. Ask the following questions.
    • What kind of data do I want to index? How you get data in depends largely on the type of data you want to ingest.
    • Is there an app for that? See Use apps to get data in.
    • Should I use forwarders to access remote data? See Forward data.
    • What do I want to do with the indexed data? See What is Splunk knowledge? in the Splunk Enterprise Knowledge Manager Manual.
  2. Create a test index and add a few inputs. Any data you add to your test index counts against your maximum daily indexing volume for licensing purposes.
  3. Preview and modify how your data will be indexed before committing the data to the test index.
  4. Review the test data that you have added with the Search app:
    • Do you see the sort of data you were expecting?
    • Did the default configurations work well for your events?
    • Is data missing or mangled?
    • Are the results optimal?
  5. If necessary, tweak your input and event processing configurations further until events look the way you want them to.
  6. Delete the data from your test index and start over, if necessary.
  7. When you are ready to index the data permanently, configure then inputs to use the default main index.

You can repeat this task to add other inputs as you familiarize yourself with the getting data in process.

Index custom data

Splunk software can index any time-series data, usually without additional configuration. If you have logs from a custom application or device, process it with the default configuration first. If you do not get the results you want, you can tweak things to make sure the software indexes your events correctly.

See Overview of event processing and How indexing works in the Splunk Enterprise Managing Indexers and Clusters of Indexers guide so that you can make decisions about how to make Splunk software work with your data. Consider the following scenarios for collecting data.

Use apps to get data in

Splunk apps and add-ons extend the capability and simplify the process of getting data into your Splunk platform deployment. Download apps from Splunkbase.

Apps typically target specific data types and handle everything from configuring the inputs to generating useful views of the data. For example, the Splunk App for Windows Infrastructure provides data inputs, searches, reports, alerts, and dashboards for Windows host management. The Splunk App for Unix and Linux offers the same for Unix and Linux environments. There is a wide range of apps to handle specific types of application data, including the following:

Last modified on 01 May, 2020
How the forwarder handles your data

This documentation applies to the following versions of Splunk Cloud: 7.2.4, 7.2.6, 7.2.7, 7.2.8, 7.2.9

Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters