Author | InQuest Labs |
---|---|
App Version | 1.0.0 |
Vendor Products | InQuest 3.80+ |
Has index-time operations | false |
Create an index | false |
Implements summarization | false |
The Splunk Addon for InQuest allows a Splunk® Enterprise administrator to search and build visualizations and alerts for InQuest device logs.
Version 1.0.0 of the Splunk Addon for InQuest is compatible with:
Splunk Enterprise versions | Verified with 6.5 and 6.6 |
---|---|
CIM | Verified with 4.9.0 |
Platforms | Platform independent |
Vendor Products | InQuest 3.80+ |
Support
Contact support@inquest.net for email support during weekday business hours (US, East Coast).
The Splunk Addon for InQuest has no special software or hardware requirements, outside of a base Splunk server install.
Because this add-on runs on Splunk Enterprise, all of the Splunk Enterprise system requirements apply.
Download the Splunk Addon for InQuest at https://splunkbase.splunk.com/apps/.
To install and configure this app on your supported platform, follow these steps:
The Splunk Addon for InQuest assumes your InQuest logs are being sent with sourcetype="syslog". If this is not the case, copy the props.conf
file from $SPLUNK_HOME/etc/apps/TA-inquest/default/props.conf
to $SPLUNK_HOME/etc/apps/TA-inquest/local/props.conf
, and change the section header from [syslog]
to whatever sourcetype you wish to use.
This app provides log field extraction and aliases for the following log types:
All fields include CIM-compliant aliases or extractions as appropriate.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.