Configure data collection on forwarders …
https://docs.splunk.com/Documentation/SplunkCloud/latest/Forwarding/Configuredatacollectiononforwarderswithinputs.conf
Edit inputs.conf Navigate to $SPLUNK_HOME/etc/system/local using your operating system file management tools or a shell or command prompt. Open inputs.conf for editing. You might need to create this file if it does not exist. Add your data inputs. Once you have added your inputs, save the file and close it. Restart the forwarder. On the receiving indexer, log in and load the Search and Reporting app. Using your operating system file management tools or a shell or command prompt, navigate to $SPLUNK_HOME/etc/system/local. Open inputs.conf for editing. You might need to create this file if it does not exist. On the machine that runs Splunk software, open a shell or command prompt. Change the listed directory to the $SPLUNK_HOME/etc/system/local directory.
Navigate to $SPLUNK_HOME/etc/system/local using your operating system file management tools or a shell or command prompt.
Open inputs.conf for editing. You might need to create this file if it does not exist.
Add your data inputs.
Once you have added your inputs, save the file and close it.
Restart the forwarder.
On the receiving indexer, log in and load the Search and Reporting app.
Using your operating system file management tools or a shell or command prompt, navigate to $SPLUNK_HOME/etc/system/local.
On the machine that runs Splunk software, open a shell or command prompt.
Change the listed directory to the $SPLUNK_HOME/etc/system/local directory.
DA: 46 PA: 90 MOZ Rank: 52 Up or Down: Up