Splunk® Add-on for Infrastructure

Use the Splunk Add-on for Infrastructure

Source types and components for the Splunk Add-on for Infrastructure

The Splunk Add-on for Infrastructure has the following source types and components.

File Description
app.conf App version and information file
indexes.conf

Default indexes for Splunk App for Infrastructure

  • em_metrics: Default metrics index
  • em_meta: Default metadata index for Kubernetes objects
  • infra_alerts: Alerts summary index
props.conf
  • em_metrics: collectd data
  • aws:cloudwatch: AWS cloudwatch metric data
  • indexed_em_alerts: Summary alerts from SAI
  • PerfmonMetrics: Windows perfmon data
  • kube:objects:pods: Kubernetes pod metadata
  • kube:objects:nodes: Kubernetes node metadata
  • vmware:events: VMware event data
  • vmware:tasks: VMware task data
  • vmware:inv:clustercomputeresource: VMware cluster inventory data
  • vmware:inv:datastore: VMware datastore inventory data
  • vmware:inv:hostsystem: VMware host inventory data
  • vmware:inv:vm: VMware virtual machine inventory data
transforms Transforms for Perfmon metrics conversion and host override for collectd and aws:cloudwatch metrics
Last modified on 06 August, 2021
Release notes for the Splunk Add-on for Infrastructure   Hardware and software requirements for the Splunk Add-on for Infrastructure

This documentation applies to the following versions of Splunk® Add-on for Infrastructure: 2.2.4, 2.2.5


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters