icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.
Log4Shell Vulnerability: Information and guidance for you. Get resources.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Ansible Monitoring and Diagnostics
SHA256 checksum (ansible-monitoring-and-diagnostics_123.tgz) e51b19f1e3b7afe30af17005e2b01a422dbf94f5615be42cf29333376d75943e SHA256 checksum (ansible-monitoring-and-diagnostics_122.tgz) 45b34208aa112daeccb6dcaf04efb7567d673d821edebbad097138a38f7b3369 SHA256 checksum (ansible-monitoring-and-diagnostics_121.tgz) 23155c1f12dcf0b4841459022dfcb02a704713e46925285871ebd815998436de
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Ansible Monitoring and Diagnostics

Overview
Details
This Splunk application provides guided navigation for the monitoring and diagnostics of Ansible plays.

Our team use this everyday and helps them diagnose their plays much faster than tailing Ansible Logs.

This Splunk application includes, and is specifically designed to work with, a new Ansible Splunk Callback maintained by Converging Data Pty Ltd. The Ansible Splunk Callback is included in the "bin" directory of this App and needs to configured within Ansible. Full details are available within the App under the "Documentation" menu.

This Splunk app and the Ansible Splunk Callback are all open source and the callback code is being submitted for inclusion in the main Ansible distribution. This app works with the free version of Splunk and so this great capability can be yours ongoing for free :-)

Ansible Monitoring & Diagnostics

This Splunk application is specifically designed to work with the Ansible Splunk Callback maintained by Deloitte. This Splunk application provides guided navigation for the monitoring and diagnostics of Ansible plays.


Getting Started Overview

Below is an overview of how to get this Splunk application and the Ansible Splunk Callback working:

  1. Install this Ansible Monitoring & Diagnostics using the normal Splunk process
  2. In Splunk add a HTTP Event Collector data input with a sourcetype of _json. Ensure to enable tokens and disable SSL
  3. Place the splunk.py Ansible callback file, currently in the apps bin directory, into a directory within the root of your Ansible playbook called callback_plugins
  4. Update your "ansible.cfg" with settings from the Splunk HTTP Event Collector data input as below

callback_whitelist = splunk

[callback_splunk]
url = http://mysplunkinstance.example.com:8088/services/collector/event
authtoken = f23b1ad6-5965-4537-bf69-b1aa54B1aa88

Now when you run your ansible plays, detailed JSON formatted results will now be sent to Splunk.

Support Ansible Versions

Ansible => 2.5

Known Issues

With Ansible 2.4 the following errors occur:
callback set_options() got an unexpected keyword argument 'task_keys'
Please avoid using Ansible versions below 2.5

Ignoring Invalid SSL Certificates:
We are aware that there is currently no way to ignore invalid SSL certificates when using HTTPS on the Splunk HTTP Event Collector. Valid SSL certificates work fine and here is a link to using Lets Encrypt to get valid certificates. A whilst this outlines the process for Splunk Web the same process slightly modified works fine for the HTTP Event Collector.


Deloitte & Splunk DataPaaS

Deloitte are a global Splunk specialist partner and we developed this application for internal use for our DevOps teams who use and develop Ansible extensively. Our Splunk specialists deploy all customer Splunk deployments using our Data Platform as a Service tool kit which is Ansible based and provides a CI/CD solution for deploying and managing Splunk at large scale.

If you would like to explore how we can enable Splunk and or Ansible solutions for your team please get in touch by emailing splunk@deloitte.com

Release Notes

Version 1.2.3
May 12, 2022

Update for jQuery 3.5

Version 1.2.2
June 6, 2018

Updated for Splunk Certification Compliance

Version 1.2.1
June 3, 2018

Updated menus for UI experience
Added feedback catcher


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.