This add-on is designed to be installed on a universal forwarder and/or indexer within your Starlink network. It enables the collection of data from the Starlink API, which can then be sent to Splunk for comprehensive analysis.
To set up the environment, follow these steps:
-
Create a virtual environment:
python -m venv venv
-
Activate the virtual environment:
source venv/bin/activate
-
Install the required dependencies:
pip install -r requirements.txt
-
Set environment variables depending on UF/HF:
HF/SH/IDX
export SPLUNK_HOME=/opt/splunk
UF
export SPLUNK_HOME=/opt/splunkforwarder
Check if the variable is set:
echo $SPLUNK_HOME
Execute the start_all_modes.sh
script to initiate all modes of the Starlink API. This script will run disk_grpc_text.py
every 60 seconds and establish the logging structure at bin/logs/*
. We will use inputs.conf
to monitor these files and send them to Splunk via HEC or syslog.
- Install the app on your Splunk indexers.
- The app will automatically detect and use the
indexes.conf
file. - Ensure that
inputs.conf
is disabled on indexers.
- The app will automatically detect and use the
After installation, verify that:
- The
starlink
index is created and visible. - No unwanted inputs are enabled on the indexers.
Run to see the script in the background:
ps aux | grep dish_grpc_text.py
start_scripts_in_background.sh
stop_scripts_in_background.sh
Starlink scripts utilized in this add-on can be found in the following repository: Starlink gRPC Tools
- Move logs into the sample logs directory.
- Implement a method to send Starlink logs to Splunk.
- Create Dashboards from the Data pulled.
- Create Alerts.