
Enable the Splunk Add-On for Unix and Linux
By enabling the Splunk Add-On for Unix and Linux, you can analyze data from your deployment and set up alerts to notify you when a change occurs.
- Log in to Splunk Light.
- Navigate to Data > Add-Ons.
- Click Enable on the Splunk Add-On for Unix and Linux.
- Click Set Up.
- Click Enable on all inputs.
- Click Save at the bottom of the page.
- Restart your Splunk Light instance for the changes to take effect.
By enabling the inputs, you set bash scripts to run at specific intervals and collect event data in the os index. Splunk Light can now access and analyze your data.
Confirm the Splunk Add-On for Unix and Linux is enabled
Ensure that your inputs are enabled.
- Log in to Splunk Light.
- Select to Data > Add-Ons.
- Click Objects in the Splunk Add-On for Unix and Linux.
- Click Indexes. The index os should have an event count greater than zero.
PREVIOUS Create an alert to monitor CPU usage using Splunk Light |
NEXT Create your search |
This documentation applies to the following versions of Splunk® Light (Legacy): 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6
Feedback submitted, thanks!