post(json-splunk-uf): props.conf can be deployed through a custom app

This commit is contained in:
Ming Di Leom 2023-10-02 02:47:53 +00:00
parent 6e837d53c6
commit 396a77f5a6
No known key found for this signature in database
GPG Key ID: 32D3E28E96A695E8
1 changed files with 7 additions and 5 deletions

View File

@ -2,7 +2,7 @@
title: Configure Splunk Universal Forwarder to ingest JSON files title: Configure Splunk Universal Forwarder to ingest JSON files
excerpt: Parse single-line JSON into separate events excerpt: Parse single-line JSON into separate events
date: 2023-06-17 date: 2023-06-17
updated: 2023-08-13 updated: 2023-10-02
tags: tags:
- splunk - splunk
--- ---
@ -27,7 +27,7 @@ The format can be achieved by exporting live event in JSON and append to a log f
I will detail the required configurations in this post, so that Splunk is able to parse it correctly even though "example.json" is a valid JSON file. I will detail the required configurations in this post, so that Splunk is able to parse it correctly even though "example.json" is a valid JSON file.
## App-specific inputs.conf ## UF inputs.conf
```conf $SPLUNK_HOME/etc/deployment-apps/foo/local/inputs.conf ```conf $SPLUNK_HOME/etc/deployment-apps/foo/local/inputs.conf
[monitor:///var/log/app_a] [monitor:///var/log/app_a]
@ -58,7 +58,7 @@ A path can be a file or a folder. When (\*) wildcard matching is used to match m
Specify an appropriate value in **sourcetype** config, the value will be the value of `sourcetype` field in the ingested events under the "monitor" directive. Take note of the value you have configured, it will be used in the rest of configurations. Specify an appropriate value in **sourcetype** config, the value will be the value of `sourcetype` field in the ingested events under the "monitor" directive. Take note of the value you have configured, it will be used in the rest of configurations.
## App-specific props.conf ## UF props.conf
```conf $SPLUNK_HOME/etc/deployment-apps/foo/local/props.conf ```conf $SPLUNK_HOME/etc/deployment-apps/foo/local/props.conf
[app_a_event] [app_a_event]
@ -90,7 +90,7 @@ The directive name should be the **sourcetype** value specified in the [inputs.c
- MAX_DAYS_AGO (optional): Specify the value if there are events older than 2,000 days. - MAX_DAYS_AGO (optional): Specify the value if there are events older than 2,000 days.
- TIME_FORMAT: Optional if Unix time is used. When Unix time is used, it is not necessary to specify `%s%3N` when there is [subsecond](https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Commontimeformatvariables). - TIME_FORMAT: Optional if Unix time is used. When Unix time is used, it is not necessary to specify `%s%3N` when there is [subsecond](https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Commontimeformatvariables).
## System props.conf ## Indexer props.conf
```conf $SPLUNK_HOME/etc/system/local/props.conf ```conf $SPLUNK_HOME/etc/system/local/props.conf
[app_a_event] [app_a_event]
@ -102,4 +102,6 @@ SHOULD_LINEMERGE = 0
# MAX_DAYS_AGO = 3560 # MAX_DAYS_AGO = 3560
``` ```
For Splunk Cloud deployment, the above configuration can only be added through Splunk Web: **Settings > [Source types](https://docs.splunk.com/Documentation/SplunkCloud/latest/Data/Managesourcetypes)**. In Splunk Enterprise, the above file can be saved in a custom app, e.g. "$SPLUNK_HOME/etc/app/custom-app/default/props.conf"
For Splunk Cloud deployment, the above configuration can be added through a custom app or Splunk Web: **Settings > [Source types](https://docs.splunk.com/Documentation/SplunkCloud/latest/Data/Managesourcetypes)**.