All Apps and Add-ons

Splunk Supporting Add-on for Active Directory: How to introduce this as a suitable metric for a metric index

sistemistiposta
Path Finder

Hello,
I have chosen "Splunk supporting Add-on for Active Directory" to perform LDAP search to my Fedora Directory Server.
Now I would like to monitor the parameters inside cn=monitor.
A search like:

 | ldapsearch domain=myLDAP search="(&(objectclass=*))" basedn="cn=monitor" scope=sub

Provides a pretty json formatted event:

{ [-]
   addentryops: [ [-]
     603
   ]
   anonymousbinds: [ [-]
     327
   ]
   bindsecurityerrors: [ [-]
     15
   ]
   bytesrecv: [ [-]
     0
   ]
   bytessent: [ [-]
     2596463937
   ]
   cacheentries: [ [-]
     0
   ]
   cachehits: [ [-]
     0
   ]
   chainings: [ [-]
     0
   ]
   cn: [ [-]
     snmp
   ]
   compareops: [ [-]
     0
   ]
   connections: [ [-]
     9
   ]
   connectionseq: [ [-]
     33669
   ]
   connectionsinmaxthreads: [ [-]
     0
   ]
   connectionsmaxthreadscount: [ [-]
     0
   ]
   copyentries: [ [-]
     0
   ]
   entriesreturned: [ [-]
     1492450
   ]
   errors: [ [-]
     176296
   ]
   inops: [ [-]
     823250
   ]
   listops: [ [-]
     0
   ]
   masterentries: [ [-]
     0
   ]
   modifyentryops: [ [-]
     489546
   ]
   modifyrdnops: [ [-]
     204
   ]
   objectClass: [ [-]
     top
     extensibleObject
   ]
   onelevelsearchops: [ [-]
     127
   ]
   readops: [ [-]
     0
   ]
   referrals: [ [-]
     0
   ]
   referralsreturned: [ [-]
     0
   ]
   removeentryops: [ [-]
     602
   ]
   searchops: [ [-]
     288365
   ]
   securityerrors: [ [-]
     18
   ]
   simpleauthbinds: [ [-]
     2102
   ]
   slavehits: [ [-]
     0
   ]
   strongauthbinds: [ [-]
     0
   ]
   unauthbinds: [ [-]
     327
   ]
   wholesubtreesearchops: [ [-]
     2849
   ]
} 

The big question is:
How to introduce this in a metric suitable for a metric index

I tried some tricks with mcollect, but it doesn't seem very easy.
Could you help me?

Thank you very much
Marco

0 Karma

skalliger
Motivator

Hi,

this requires quite some work to do. 🙂
I'd suggest building a Data Model instead. Easier to manage and better extensible.

A metrics index requires specific fields to be set. Read more about it here:https://docs.splunk.com/Documentation/Splunk/7.3.0/Metrics/GetStarted#Metrics_data_format

Skalli

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...