All Apps and Add-ons

Splunk Supporting Add-on for Active Directory: How to introduce this as a suitable metric for a metric index

sistemistiposta
Path Finder

Hello,
I have chosen "Splunk supporting Add-on for Active Directory" to perform LDAP search to my Fedora Directory Server.
Now I would like to monitor the parameters inside cn=monitor.
A search like:

 | ldapsearch domain=myLDAP search="(&(objectclass=*))" basedn="cn=monitor" scope=sub

Provides a pretty json formatted event:

{ [-]
   addentryops: [ [-]
     603
   ]
   anonymousbinds: [ [-]
     327
   ]
   bindsecurityerrors: [ [-]
     15
   ]
   bytesrecv: [ [-]
     0
   ]
   bytessent: [ [-]
     2596463937
   ]
   cacheentries: [ [-]
     0
   ]
   cachehits: [ [-]
     0
   ]
   chainings: [ [-]
     0
   ]
   cn: [ [-]
     snmp
   ]
   compareops: [ [-]
     0
   ]
   connections: [ [-]
     9
   ]
   connectionseq: [ [-]
     33669
   ]
   connectionsinmaxthreads: [ [-]
     0
   ]
   connectionsmaxthreadscount: [ [-]
     0
   ]
   copyentries: [ [-]
     0
   ]
   entriesreturned: [ [-]
     1492450
   ]
   errors: [ [-]
     176296
   ]
   inops: [ [-]
     823250
   ]
   listops: [ [-]
     0
   ]
   masterentries: [ [-]
     0
   ]
   modifyentryops: [ [-]
     489546
   ]
   modifyrdnops: [ [-]
     204
   ]
   objectClass: [ [-]
     top
     extensibleObject
   ]
   onelevelsearchops: [ [-]
     127
   ]
   readops: [ [-]
     0
   ]
   referrals: [ [-]
     0
   ]
   referralsreturned: [ [-]
     0
   ]
   removeentryops: [ [-]
     602
   ]
   searchops: [ [-]
     288365
   ]
   securityerrors: [ [-]
     18
   ]
   simpleauthbinds: [ [-]
     2102
   ]
   slavehits: [ [-]
     0
   ]
   strongauthbinds: [ [-]
     0
   ]
   unauthbinds: [ [-]
     327
   ]
   wholesubtreesearchops: [ [-]
     2849
   ]
} 

The big question is:
How to introduce this in a metric suitable for a metric index

I tried some tricks with mcollect, but it doesn't seem very easy.
Could you help me?

Thank you very much
Marco

0 Karma

skalliger
Motivator

Hi,

this requires quite some work to do. 🙂
I'd suggest building a Data Model instead. Easier to manage and better extensible.

A metrics index requires specific fields to be set. Read more about it here:https://docs.splunk.com/Documentation/Splunk/7.3.0/Metrics/GetStarted#Metrics_data_format

Skalli

0 Karma
Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...