All Apps and Add-ons

Splunk Supporting Add-on for Active Directory: How to introduce this as a suitable metric for a metric index

sistemistiposta
Path Finder

Hello,
I have chosen "Splunk supporting Add-on for Active Directory" to perform LDAP search to my Fedora Directory Server.
Now I would like to monitor the parameters inside cn=monitor.
A search like:

 | ldapsearch domain=myLDAP search="(&(objectclass=*))" basedn="cn=monitor" scope=sub

Provides a pretty json formatted event:

{ [-]
   addentryops: [ [-]
     603
   ]
   anonymousbinds: [ [-]
     327
   ]
   bindsecurityerrors: [ [-]
     15
   ]
   bytesrecv: [ [-]
     0
   ]
   bytessent: [ [-]
     2596463937
   ]
   cacheentries: [ [-]
     0
   ]
   cachehits: [ [-]
     0
   ]
   chainings: [ [-]
     0
   ]
   cn: [ [-]
     snmp
   ]
   compareops: [ [-]
     0
   ]
   connections: [ [-]
     9
   ]
   connectionseq: [ [-]
     33669
   ]
   connectionsinmaxthreads: [ [-]
     0
   ]
   connectionsmaxthreadscount: [ [-]
     0
   ]
   copyentries: [ [-]
     0
   ]
   entriesreturned: [ [-]
     1492450
   ]
   errors: [ [-]
     176296
   ]
   inops: [ [-]
     823250
   ]
   listops: [ [-]
     0
   ]
   masterentries: [ [-]
     0
   ]
   modifyentryops: [ [-]
     489546
   ]
   modifyrdnops: [ [-]
     204
   ]
   objectClass: [ [-]
     top
     extensibleObject
   ]
   onelevelsearchops: [ [-]
     127
   ]
   readops: [ [-]
     0
   ]
   referrals: [ [-]
     0
   ]
   referralsreturned: [ [-]
     0
   ]
   removeentryops: [ [-]
     602
   ]
   searchops: [ [-]
     288365
   ]
   securityerrors: [ [-]
     18
   ]
   simpleauthbinds: [ [-]
     2102
   ]
   slavehits: [ [-]
     0
   ]
   strongauthbinds: [ [-]
     0
   ]
   unauthbinds: [ [-]
     327
   ]
   wholesubtreesearchops: [ [-]
     2849
   ]
} 

The big question is:
How to introduce this in a metric suitable for a metric index

I tried some tricks with mcollect, but it doesn't seem very easy.
Could you help me?

Thank you very much
Marco

0 Karma

skalliger
Motivator

Hi,

this requires quite some work to do. 🙂
I'd suggest building a Data Model instead. Easier to manage and better extensible.

A metrics index requires specific fields to be set. Read more about it here:https://docs.splunk.com/Documentation/Splunk/7.3.0/Metrics/GetStarted#Metrics_data_format

Skalli

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...