Preparing to send data to Splunk via the Data Receiver
To send data from Z Common Data Provider to Splunk, configure and run an Z Common Data Provider Data Receiver on the system where the Splunk Enterprise server or heavy forwarder is installed. In Splunk, you must also install the Z Common Data Provider Buffered Splunk Ingestion App.
Procedure
In preparation for sending data to Splunk, complete the following steps:
Results
You can see the data that is loaded into Splunk by using a simple search. For example, the
following search shows you all ingested z/OS® SYSLOG events in
the
zosdex index:
index=zosdex sourcetype=zOS-SYSLOG-ConsoleIf you expand an event, you can see the individual fields for which extraction rules are set.
The following search example shows you the z/OS SYSLOG messages that are issued by the CICS35 job that is running on your production sysplex and are in the
zosdex
index:index=zosdex sysplex=PRODPLEX jobname=CICS35 sourcetype=zOS-SYSLOG-ConsoleYou can also use Splunk analytics tools to analyze the data, or write your own deep analysis
tools.
Tip: Currently the Buffered Splunk Ingestion App supports only the following log
data types for indexing:
- Job log
- z/OS UNIX log file
- Entry-sequenced VSAM cluster
- z/OS SYSLOG
- IBM Z® NetView messages
- IBM® WebSphere® Application Server for z/OS HPEL log
- Resource Measurement Facility Monitor III reports
- z/OS sequential data set
For more information, see Configuration reference for data gathered by Log Forwarder.
Searches for other types of data will not yield any results, although the data is in the output directory that is specified by the environment variable CDPDR_PATH. To use this data in the Z Common Data Provider, you can edit the Buffered Splunk Ingestion App, which is installed in the directory SPLUNK_HOME/etc/apps/ibm_cdpz_buffer/.Splunk indexers can generally ingest data up to 300GB per day. Further data volumes require multiple indexers and search heads. See recommendations of Splunk on scaling and capacity planning for more information.