I know that CIM Add-on has some knowledge objects that are obvious which includes fields, event type, tags and field aliases. What are other knowledge objects included in the CIM Add-On?
I was not able to find a clear answer to this question in the Splunk docs.
Examination of the add-on itself ($SPLUNK_HOME/etc/apps/Splunk_SA_CIM/default) shows what KOs it creates.
There are the datamodels, of course, and the macros used within them.
There also are calculated fields, indexed fields, aliases, and reports for the audittrail, splunkd, and splunk_web_services sourcetypes.
The stash_common_action_model sourcetype.
Also defined are a KVStore collection, an external command, eventtypes, an index, inputs, REST endpoints, saved searches, tags, transforms, and dashboards.
Some of these probably should be documented. Submit feedback on the Docs page to request it.
IMO, every TA should be examined before it is installed to see what it brings to the environment. This helps to prevent undesired side-effects and makes the admin aware of any local changes that may be needed (like to indexes.conf).
Wait, wait, wait.
I can see a confusion here.
The main question is why are you asking this question. And the main issue is that people often misunderstood how CIM data models work.
CIM datamodels generally do not do anything. They provide data model definitions and expect the data to have specific fields or tags defined. The only tweakable thing that is getting defined within the CIM add-on (not within the data models themselves; again - they only hse those) that I can think of are the configuration aliases used for specifying indexes from which data models are mapped.
And that's all. The specific data models require the data to be properly tagged but they do not tag the data themselves. They require the party onboarding the data into Splunk (or the creator of a TA used for such onboarding) to prepare the data properly.
CIM data models use tags to select data but those are typically (especially if using Add-on Builder) assigned to eventtypes. But there is no strict technical requirement for it AFAIR.
Not judging anybody's knowledge here at all but you can see the problem right...both @PrewinThomas and @Meett have different opinions on this and there is nothing I can see on this in the documentation. I am a total beginner so which one is the correct response?
🙂
Both answers are valid! There isn't a single official definition for your question. @Meett gave you the general/common knowledge objects found in the CIM add-on (https://splunkbase.splunk.com/app/1621), but I also pointed out other knowledge objects that are included with it(some are least used).
The best way to see everything is to go through your knowledge objects in Splunk one by one, set the App filter to the Splunk CIM, and set the configuration source to “Created in the app.” That way, you’ll get the full list of what’s built into CIM, and can explore them yourself.
Regards,
Prewin
If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!
@CyberAar
Besides fields, event type, tags and field aliases, Splunk CIM Add-on also includes the following knowledge objects,
Data Models, Field Extractions, Lookups, Commands, Macros, Workflow Actions, views, Reports.
Regards,
Prewin
If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!
Hello @CyberAar So the main KOs aligned with CIM Add-on are event type, tags , field aliases , Lookups , Data Models.