Getting Data In

Forwarder Data Input recommendations for Windows servers - different roles

oneashraf
New Member

Best recomended practices - Data Input config for Windows servers with the following roles IIS - SQL - Domain Controllers - Sharepoint - Exchnage

Tags (1)
0 Karma

barakreeves
Splunk Employee
Splunk Employee

I agree with the comments so far. I just want to expand just a little more.

  • install the Universal Forwarder on the target Windows machines
  • Install the Windows app and see how much milage that gets you in monitoring the rest; also look at the Exchange and SQL apps as well Browse the aforementioned apps directory structure explore such things as the inputs and savedsearches conf files to see how all this is working behind the scenes. Feel free to copy and paste these searches in the search bar and modify/tweak to gain additional insights into your data.

For more fine tuning, consider this:
- the application inputs SQL, IIS, Exchange, etc can get real chatty...that's both good and bad. Here is my suggestion on this:
Create a test-msft index and send your data from a couple of servers to that index for a couple of days. What you are looking for is what data is mere noise vs insights. You create a test index so that once you get the data you like coming in, you point it to either your default index or another index; afterwards, delete the test index. (this is a common practice for me)

Install the Deployment Monitor and the SoS apps to monitor what you will be doing next.

Grooming your data:

This will be done using the inputs.conf file one each forwarder. Here's the link: http://docs.splunk.com/Documentation/Splunk/5.0.3/admin/Inputsconf

If you feel the need to throttle the amount of data being indexed, add information to the "whitelist" and "blacklist" sections. This restricts/ allows what data will be forwarded to the indexer.

0 Karma

marcoscala
Builder

Snare si fine, but I do recommend, whenever is possible, to use a Universal Forwarder on the Windows servers to send logs to Splunk indexers, because you can take advantage of Forwarder's functionality like load balancing, consistency of logs sent in case of communication failures or in the indexer is down, just to mention some.
Moreover, using a forwarder, you have native recognition of events coming from WinEventlog.

0 Karma

mayler
Path Finder

I'm going to assume you are using some type of log forwarder to send these logs to splunk. I am using Snare on my windows servers. It allows me to tell it to send logs on any port I choose. For my DHCP Server, I'm having it send logs to splunk using port 516. On Splunk, I've configured a Data Input, UDP port 516, SourceType: from list, Windows Snare Syslog.

It formats it perfectly. I guess you could do that for each Server.

0 Karma
Get Updates on the Splunk Community!

Index This | I am a number, but when you add ‘G’ to me, I go away. What number am I?

March 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

What’s New in Splunk App for PCI Compliance 5.3.1?

The Splunk App for PCI Compliance allows customers to extend the power of their existing Splunk solution with ...

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...