Splunk® Light (Legacy)

Search and Reporting Examples

Acrobat logo Download manual as PDF


Acrobat logo Download topic as PDF

Enable the Splunk Add-On for Unix and Linux

By enabling the Splunk Add-On for Unix and Linux, you can analyze data from your deployment and set up alerts to notify you when a change occurs.

  1. Log in to Splunk Light.
  2. Navigate to Data > Add-Ons.
  3. Click Enable on the Splunk Add-On for Unix and Linux.
  4. Click Set Up.
  5. Click Enable on all inputs.
  6. Click Save at the bottom of the page.
  7. Restart your Splunk Light instance for the changes to take effect.

By enabling the inputs, you set bash scripts to run at specific intervals and collect event data in the os index. Splunk Light can now access and analyze your data.

Confirm the Splunk Add-On for Unix and Linux is enabled

Ensure that your inputs are enabled.

  1. Log in to Splunk Light.
  2. Select to Data > Add-Ons.
  3. Click Objects in the Splunk Add-On for Unix and Linux.
  4. Click Indexes. The index os should have an event count greater than zero.
Last modified on 11 August, 2016
PREVIOUS
Create an alert to monitor CPU usage using Splunk Light
  NEXT
Create your search

This documentation applies to the following versions of Splunk® Light (Legacy): 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.5.0, 6.5.1, 6.5.2, 6.5.3, 6.5.1612 (cloud service only), 6.6.0, 6.6.1, 6.6.2, 6.6.3, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6


Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters