You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+18-6Lines changed: 18 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,27 +52,29 @@ Our integration uses the [Splunk HEC](https://dev.splunk.com/enterprise/docs/dat
52
52
53
53
Users will need to configure the HEC to accept data (enabled) and also create a new token. Steps are below.
54
54
55
-
#### Create index jfrog_splunk
55
+
#### Create index for logs (default: jfrog_splunk)
56
56
57
57
```text
58
58
1. Open Splunk web console as administrator
59
59
2. Click on "Settings" in dropdown select "Indexes"
60
60
3. Click on "New Index"
61
-
4. Enter Index name as jfrog_splunk
61
+
4. Enter Index name as jfrog_splunk (or your custom name)
62
62
5. Click "Save"
63
63
```
64
64
65
-
#### Create index jfrog_splunk_metrics
65
+
#### Create index for metrics (default: jfrog_splunk_metrics)
66
66
67
67
```text
68
68
1. Open Splunk web console as administrator
69
69
2. Click on "Settings" in dropdown select "Indexes"
70
70
3. Click on "New Index"
71
-
4. Enter Index name as jfrog_splunk_metrics
71
+
4. Enter Index name as jfrog_splunk_metrics (or your custom name)
72
72
5. Select Index Data Type as Metrics
73
73
6. Click "Save"
74
74
```
75
75
76
+
**Note:** You can customize the index names by setting the `SPLUNK_LOGS_INDEX` and `SPLUNK_METRICS_INDEX` environment variables in your docker.env file.
77
+
76
78
#### Configure new HEC token to receive Logs
77
79
78
80
```text
@@ -83,7 +85,7 @@ Users will need to configure the HEC to accept data (enabled) and also create a
83
85
5. Enter a "Name" in the textbox
84
86
6. (Optional) Enter a "Description" in the textbox
85
87
7. Click on the green "Next" button
86
-
8. Add "jfrog_splunk" index to store the JFrog platform log data into.
88
+
8. Add "jfrog_splunk" (or your custom logs index name) to store the JFrog platform log data into.
87
89
9. Click on the green "Review" button
88
90
10. If good, Click on the green "Done" button
89
91
11. Save the generated token value
@@ -99,7 +101,7 @@ Users will need to configure the HEC to accept data (enabled) and also create a
99
101
5. Enter a "Name" in the textbox
100
102
6. (Optional) Enter a "Description" in the textbox
101
103
7. Click on the green "Next" button
102
-
8. Add "jfrog_splunk_metrics" index to store the JFrog platform metrics data into.
104
+
8. Add "jfrog_splunk_metrics" (or your custom metrics index name) to store the JFrog platform metrics data into.
103
105
9. Click on the green "Review" button
104
106
10. If good, Click on the green "Done" button
105
107
11. Save the generated token value
@@ -176,6 +178,8 @@ We rely heavily on environment variables so that the correct log files are strea
176
178
***SPLUNK_HEC_PORT**: Splunk HEC configured port
177
179
***SPLUNK_HEC_TOKEN**: Splunk HEC Token for sending logs to Splunk
178
180
***SPLUNK_METRICS_HEC_TOKEN**: Splunk HEC Token for sending metrics to Splunk
181
+
***SPLUNK_LOGS_INDEX**: Splunk index name for storing logs (default: jfrog_splunk)
182
+
***SPLUNK_METRICS_INDEX**: Splunk index name for storing metrics (default: jfrog_splunk_metrics)
179
183
***SPLUNK_INSECURE_SSL**: false for test environments only or if http scheme
180
184
***SPLUNK_VERIFY_SSL**: false for disabling ssl validation (useful for proxy forwarding or bypassing ssl certificate validation)
181
185
***SPLUNK_COMPRESS_DATA**: true for compressing logs and metrics json payloads on outbound to Splunk
Copy file name to clipboardExpand all lines: app/jfrog-logs/README.md
+8-2Lines changed: 8 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,11 +4,13 @@
4
4
Install the app in your Splunk instance. Then restart your Splunk instance by going to _Server Controls > Restart_.
5
5
6
6
## Splunk Setup
7
-
1. Create new Events index `jfrog_splunk` at _Settings > Indexes > New Index > Save_
8
-
2. Create new Metrics index `jfrog_splunk_metrics` at _Settings > Indexes > New Index > Metrics > Save_
7
+
1. Create new Events index `jfrog_splunk`(or your custom name) at _Settings > Indexes > New Index > Save_
8
+
2. Create new Metrics index `jfrog_splunk_metrics`(or your custom name) at _Settings > Indexes > New Index > Metrics > Save_
9
9
3. Create a new HTTP Event Collector data input for logs at _Settings > Data Inputs > HTTP Event Collector > New Token > jfrog_splunk index > Save_
10
10
4. Create a new HTTP Event Collector data input for metrics at _Settings > Data Inputs > HTTP Event Collector > New Token > jfrog_splunk_metrics index > Save_
11
11
12
+
**Note:** You can customize the index names by setting the `SPLUNK_LOGS_INDEX` and `SPLUNK_METRICS_INDEX` environment variables in your configuration.
13
+
12
14
## Setup Fluentd
13
15
FluentD is used to send log events to Splunk. This [repo](https://github.com/jfrog/log-analytics-splunk) contains instructions on various installations options for Fluentd as a logging agent.
0 commit comments