All Apps and Add-ons

Splunk App for AWS - Searches use wrong account search key

cleibl001
Engager

I am using the Splunk App for AWS and the Splunk Add-on for AWS. I have created a descriptions input for my account and can see the sourcetype "aws:descriptions" logs in my custom index. However, the data is not being populated in the dashboards.

When I run one of the searches, I see the search is using the search key of aws_account_id, however in the logs the key is account_id.

For example below is the search for security group rules, and returns no results:

(index="mycustomindex" sourcetype="aws:description" aws_account_id="12345678912" region="" source=":ec2_security_groups") | eventstats latest(_time) as latest_time | eval latest_time=relative_time(latest_time,"-55m") | where ('_time' > latest_time) | dedup id sortby -_time

When I change the "aws_account_id" key to "account_id" I am able to get results

(index="mycustomindex" sourcetype="aws:description" account_id="12345678912" region="" source=":ec2_security_groups") | eventstats latest(_time) as latest_time | eval latest_time=relative_time(latest_time,"-55m") | where ('_time' > latest_time) | dedup id sortby -_time

Am I missing a transformation somewhere

Thanks

Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...