Skip to content

Splunk Configuration

splunk_logo
Now that we have a Splunk server setup, we need to customize it to report our probe data. The steps required are all via the Splunk web GUI and are the same for all OS flavours.

Configure Data Input To Splunk

We need to tell Splunk how we’ll be sending the data from our probe in to Splunk. We need to configure a data input that will prepare Splunk to receive the data, and to generate an authorization key to be used by the probe when sending its results data.

Log In To Splunk

The first step is to login to Splunk using the credentials created during the Splunk install. The URL to use is:

    http://<Splunk_server_IP>:8000

Configure HTTP Event Collector Global Options

After login, the following page will be seen:

splunk_cfg1

Follow the “Settings > Data > Data Inputs” menu options :

splunk_cfg2

Click on the HTTP Event Collector link in the Data Inputs page shown:

splunk_cfg3

splunk_cfg4

Click on the “Global Settings” button as indicated in the graphic above to reveal the global configuration panel for the HTTP Event Collector:

splunk_cfg5

Ensure the panel is configured to look like the example shown above. This should require the following steps:

  • Make sure you hit the All Tokens > Enabled button (this is disabled by default which stops everything working)
  • Default Source Type: Structured > _json
  • Hit: Save to take you back to the HTTP Event Collector page

Create a HEC Token

After returning to the HTTP Event Collector page, hit the New Token button. This will start a token creation wizard.

splunk_cfg6

Enter a name for the token (probe HEC Token) then hit Next > :

splunk_cfg7

In the next wizard panel select Source type: Select > Structured > _json :

splunk_cfg8

Scroll down to the indexes and make the following selections:

  • Select Allowed Indexes > add all
  • Default Index : main

Next, hit the Review > button:

splunk_cfg9

The token review panel is now should and should look like the graphic below. Finally hit the Submit> button:

splunk_cfg10

A final confirmation message will be provided as shown below:

splunk_cfg11

If you return to Settings > Data Input > HTTPS Event Collector, you will now see the token your probe will need to communicate with the Splunk server:

splunk_cfg12

At this point, the Splunk server is ready to receive data from the probe. Ensure that your probe has been configured with the correct server IP address, port number and the token we have just created above (copy and paste the “Token Value” in to your probe config.ini file).

If using the WLAN Pi, ensure that it is flipped in to wiperf mode. On the RPI, ensure that the required cron job has been configured to start polling.

After a few minutes, when the probe has run a test cycle, data should start to appear in Splunk. The quickest way to check is to do a general search for data in Splunk and see what is being received. Go to “Apps : Search & Reporting > Search & Reporting” (top menu bar) and enter a “*” in the “New Search” text box. Results data should be seen as shown below:

splunk_cfg13

If your search result looks like this (no results found message), then you need to wait a little longer for data to arrive, or there is likely a comms problem between your probe and Splunk:

splunk_cfg14

Create a Dashboard

Now that we have data arriving at our Splunk server, we need to view the data in an interesting format. Splunk allows us to create reporting dashboards to visualize our data. We will now create a simple dashboard to demonstrate the visualization capabilities.

In the probe’s /usr/share/wiperf/dashboards directory, a number of pre-canned dashboard files have been provided to allow a simple copy & paste operation to create a dashboard. These files are also available on the GitHub page of the wiperf project:

Use an SFTP client to pull the “01 - probe_summary.xml” file from your probe, or open the file on the GitHub page and select “Raw” to copy and paste the code in to a local file on your laptop.

In the Splunk GUI, go to “Apps : Search & Reporting > Search & Reporting” (top menu bar) and hit the “Dashboards” link:

splunk_cfg15

Hit the "Create New Dashboard" button:

splunk_cfg16

In the pop-up panel, enter a dashboard name and hit the "Create Dashboard" button:

splunk_cfg17

In the “Edit Dashboard” panel that opens, hit the “Source” button:

splunk_cfg18

By default, some basic XML configuration will exist in the dashboard definition:

splunk_cfg19

Open up the dashboard definition file previously downloaded from your probe or the GitHub site in a text editor. Then simply paste in the code as shown below (make sure the original code was all removed):

splunk_cfg20

After hitting the Save button, the dashboard will now be shown:

splunk_cfg21

Using the hostname and time period selector above the graphs, different probes and reporting periods may be viewed.

The process above may be repeated using each of the xml files found in the dashboards folder to create a series of separate dashboards that focus on different aspects of data available using wiperf.


Last update: July 13, 2020