Skip to main content
Skip table of contents

Configuring splunk

Prerequisites

Before you configure the Delphix Engine you will need to configure and make a note of the following in Splunk:

Please refer to the Splunk documentation for detailed steps on how to configure your values.

Supported Splunk versions

Delphix only supports Splunk Enterprise 6.3.0 or higher.

  1. In the Splunk web UI Enable SSL (this is optional but best practice for security) in your global HTTP Event Collector (HEC) settings.

  2. The Splunk hostname or IP Address.

  3. The HEC Port number for your Splunk instance (default 8088).

  4. Enable the HTTP Event Collector on Splunk, and create a new HEC Token with a new Splunk index set as an allowed index for the token. Make sure Enable Indexer Acknowledgement is unchecked for the token. Warning : If you wish, you can use a separate Splunk index for performance and capacity metrics (otherwise, the same index will be used for both events and metrics). If you are using Splunk 7.0+, it is recommended that you create this second index as a special “Metrics” type index that is optimized for indexing and searching metrics data.

  5. Note the HEC Token Value and the Allowed Indexes for the token.

The following table provides an example of the data you will need.

Attribute

Sample data

Splunk Server IP address

192.168.8.8

Splunk Server HEC Port Number

8088

Splunk HEC Token

12345678-1234-1234-1234-1234567890AB

Index Name for Events

delphix_events

Index Name for Metrics

delphix_metrics

Configuring Delphix for Splunk

  1. Log in to the Delphix Server Setup UI as the sysadmin.

  2. From the Preferences menu select Fluentd Configuration

    Splunk.png
  3. In the Fluentd Configuration window, enter your Splunk values, using the default splunkHec plugin configuration.

Host

Splunk hostname or IP address

HEC Port

The TCP port number for the Splunk HTTP Event Collector (HEC)

HEC Token

The token for the Splunk HTTP Event Collector (HEC)

Main Index

The Splunk Index events will be sent to. It must be set as an allowed index for the HEC token.

Events Push Frequency

The frequency at which the Events will be pushed to Splunk. Specified in seconds.

Enable SSL

Whether to use HTTPS to connect to Splunk. Must match your HTTP Event Collector settings in Splunk.

Metrics Index

The Splunk Index metrics will be sent to. If none is specified then the Main Index will be used for metrics as well. It must be set as an allowed index for the HEC token.

Metrics Push Frequency

The frequency at which the Performance Metrics will be pushed to Splunk. Specified in seconds

Performance Data Granularity

The resolution of performance metrics data sent to Splunk.
This controls the granularity of system performance metric values sent to Splunk.
For example: Setting this to "Per Minute" results in a system performance metric to have a per-minute aggregated value (as collected by the analytics subsystem of the Delphix Engine) instead of a per-second value.

Reducing the volume of data

To reduce the volume of data that will be sent to Splunk, you can change the Performance Data Granularity to Per Minute or uncheck Enable Metrics.

4. Click Send Test Data to verify your provided values. This will send a test event to the provided token and indexes.

5. Click Save to enable the Splunk configuration and begin sending all new Actions, Job Events, Faults, Alerts, and Metrics to your Splunk instance.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.