Knowledge Management

Addon parsed field does not go in proper Data Model

SIEMStudent
Path Finder

Hi Splunkers,

for our environments, I needed a custom parser for some waf logs, so I created an addon to provide this.
The addon has been created on a local Splunk istance on my Desktop; once completed and tested, it has been loaded on our Splunk Cloud istance, where it has Global permissions.

The point is the following: the addon, once installed on cloud, correctly parse the logs and perform field extraction as desidered, coerently with results got on local istance; also, the events are correctly tagged with "attack" and "ids" as desired, due we want to see those events on Data Model Intrusion Detection.
Unfortunately, when I try to perform a search with Intrusion Detection DM, the events are not present; a simple search like

 

|tstats summariesonly=true fillnull_value="N/D" count from datamodel=Intrusion_Detection by sourcetype

 

does not show me, in output, the sourcetype created during addon creation.

I followed the usual way I use to create addon Data Model matching, which is:

1. create a eventtype in eventtypes.conf with syntax:

 

[<eventtype name>]
search = <sourcetype> <parameters list>

 


2. use the above eventtype in tags.conf for tagging, with syntax

 

[eventtype=<eventtype name>]
attack=enabled
ids=enabled

 

If permissions are ok, what could be the root cause?

Labels (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Eventtype is one thing but it's common with data models (especially the CIM ones) to restrict events to specific indexes. Do the events you'd like to see in the datamodel go into the right index? (in case of CIM's Intrusion Detection datamodel the indexes are defined in `cim_Intrusion_Detection_indexes` macro)

0 Karma

SIEMStudent
Path Finder

Hi Rick,

thanks for your suggestion; I suppose you are right, because the incriminated logs are in a index which is not included in the ones belonging to suggested macro.
I will work on this.

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...