Install the Splunk Add-on for Exposure Analytics
Use the Splunk deployment server to deploy the Splunk Add-on for Exposure Analytics to your Splunk forwarders. To install the add-on, complete the following steps:
Deploy apps to forwarders
Deploy the appropriate apps to your forwarders using a local inputs configuration:
-
Place the apps in the deployment-apps folder on your deployment server.
-
Create a local directory in each app and place a local inputs.conf file in each one. See the local inputs.conf files below.
-
For each type of operating system you deploy to, deploy the apps using an appropriate serverclass. For example, create a serverclass to deploy to all Windows forwarders, and a serverclass to deploy to all Linux forwarders.
Local inputs.conf Files
-
Create a local directory within the app.
-
Using a text editor, create a new inputs.conf in local for editing.
-
Use the following local inputs.conf files content to enable the various inputs and place them in the local inputs.conf for each app.
-
Save the file and close it.
####################################################################
## Monitoring of Windows System Info file
[script://.\bin\ea_get_system_info_ps.bat]
disabled = false
####################################################################
## Monitoring of User details
[script://.\bin\ea_get_user_details_ps.bat]
disabled = false
####################################################################
## Monitoring of Bitlocker Info file
[script://.\bin\ea_get_bitlocker_info_ps.bat]
disabled = false
####################################################################
## Monitoring of Windows Network Info file
[script://.\bin\ea_get_network_info_ps.bat]
disabled = false
####################################################################
## Monitoring of Nix System Info
[script://./bin/ea_linux_get_system_info.sh]
disabled = false
####################################################################
## Monitoring of Network Info
[script://./bin/ea_linux_get_network_info.sh]
disabled = false
####################################################################
## Monitoring of User details
[script://./bin/ea_linux_get_user_details.sh]
disabled = false
####################################################################
## Monitoring of RPM/DEB Installed Software Packages
[script://./bin/ea_linux_get_packages_list.sh]
disabled = false
####################################################################
## Monitoring of Mac OSx InstalledPrograms
[script://./bin/ea_osx_get_app_list.sh]
disabled = false
####################################################################
## Monitoring of Mac OSx System Info
[script://./bin/ea_osx_get_system_info.sh]
disabled = false
####################################################################
## Monitoring of Network Info
[script://./bin/ea_osx_get_network_info.sh]
disabled = false
####################################################################
## Monitoring of User details
[script://./bin/ea_osx_get_user_details.sh]
disabled = false
Uninstall
To uninstall the Splunk Add-on for Exposure Analytics, use forwarder management to remove the deployment apps from your deployment server. See Uninstall an app in the Splunk Enterprise Admin Manual.
Next step
index=ea_sources sourcetype=ea:ta:asset
See Predefined entity discovery sources available for the Splunk Add-on for Exposure Analytics.