Configure monitor inputs for the gc.log and serverindex.xml logs¶
If you plan to use the Splunk Add-on for IBM WebSphere Application
Server with IT Service Intelligence (ITSI), you need to create inputs
for the gc.log and serverindex.xml logs. Although you can use the
setup page to generate inputs for most of the local server logs, you
must manually create monitor inputs for the gc.log and
serverindex.xml logs. You can use either Splunk Web to create the
monitor inputs or configure inputs.conf directly.
Configure Monitoring through Splunk Web¶
Configure file monitoring inputs on your data collection node for the
gc.log and serverindex.xml logs.
-
Log into Splunk Web.
-
Select Settings > Data inputs > Files & directories.
-
Click New.
-
Click Browse next to the File or Directory field.
-
Navigate to directory of your
gc.log, and click Next. -
In the Sourcetype field, select
ibm:was:gcLog, and click Next. -
Click Review.
-
After you review the information, click Submit.
-
Repeat this procedure for the
serverindex.xmland assign a source type ofibm:was:serverIndex.
Configure inputs.conf¶
You can configure the monitor inputs in the inputs.conf file instead
of using Splunk Web. After setting up the add-on, using either the setup
page or using the configuration files and running the python script, a
local/inputs.conf file gets generated for you. Edit this file to add
the file monitor inputs.
-
Using a text editor, open the
$SPLUNK_HOME/etc/apps/Splunk_TA_ibm-was/local/inputs.conffile. -
Add the following stanzas and lines, replacing
server_name,cell_name, andnode_namewith the appropriate values for your environment, and save the file:
[monitor:///opt/IBM/WebSphere/AppServer/profiles/AppSrv01/logs/<server_name>/gc.log]
sourcetype = ibm:was:gcLog
disabled = 0
[monitor:///opt/IBM/WebSphere/AppServer/profiles/AppSrv01/config/cells/$<cell_name>/nodes/$<node_name>/serverindex.xml]
sourcetype = ibm:was:serverIndex
disabled = 0
- Restart the Splunk platform in order for the new inputs to take effect.
Validate inputs for gc.log and serverindex.xml¶
After you configure monitoring, verify that data from the two sources is being ingested into the Splunk platform by using the following search commands and verifying that one or more events is returned.
sourcetype=ibm:was:gcLog
sourcetype=ibm:was:serverIndex