Prerequisites for the Splunk Connect for SNMP¶
Setup flow overview¶
- Prerequisites (this page) — prepare Splunk indexes and HEC token
- Install Docker — install Docker on the host machine
- Download package — download and extract the
docker_compose.zippackage - Configure — create and edit the required configuration files in this order:
- Inventory file — define which devices to poll
- Scheduler config — define polling profiles, communities, and groups
- Traps config — define communities and secrets for receiving traps
- SNMPv3 secrets (optional) — create Docker secrets for SNMPv3 credentials
.envfile — set file paths, Splunk connection details, and tuning parameters
- Deploy — run
docker compose up -d
Requirements for Splunk Enterprise or Enterprise Cloud¶
- Manually create the following indexes in Splunk:
- Index to store Splunk Connect for SNMP logs:
- em_logs (event type)
- Destination indexes for forwarding SNMP data:
- netmetrics (metrics type)
- netops (event type)
Note
netmetrics and netops are the default names of SC4SNMP indexes. You can use the index names of your choice and reference it in the .env file later on. See SC4SNMP Parameters for details.
- Create or obtain a new Splunk HTTP Event Collector token and the correct HTTPS endpoint.
- Verify the token using curl. The endpoint must use a publicly trusted certificate authority.
Once the above steps are complete, proceed to Install Docker.