Monitoring Splunk

In splunk how CMDB fields mapped.

kingbert_Thomas
New Member

In splunk how we create these CMDB fields mapped to any sourcetype when new host added as asset..

like the below fields, if we don't have C

CRITICITY
ENVIRONMENT
FUNCTION
OFFER
BUSINESS UNIT
CODEREF
DATACENTER

Labels (1)
0 Karma

isoutamo
SplunkTrust
SplunkTrust

There are already some proposals how this could maybe do. But to understand better your situation and which solution is best for you, we should know more about your needs, used tools, environment and what is your target for this.

  • How you are collecting data?
  • Are you managing all inputs?
  • Have you some other tools where you have some kind of CMDB?
  • How you are deploying inputs?
  • Are you using Splunk's ARI?

If you are managing all inputs then maybe the easiest way to add this is use _meta field on those inputs. Just add those values in all input stanzas and then you have those events in your data when it comes into Splunk indexers.

Other options are just use e.g. tags when you are onboarding data sources into splunk as already mentioned.

As you see there is many ways to do it, and without more information it's impossible to say how you should do it.

r. Ismo

0 Karma

kiran_panchavat
Champion

@kingbert_Thomas 

  1. Create and Save a Search:

    • Create a search that returns the necessary information for your CMDB fields.
    • Save this search as a report and schedule it to run regularly.
  2. Create Lookup Definitions:

    • Go to Settings > Lookups > Lookup definitions and create a new lookup definition.
    • Choose the destination app and select the output lookup CSV file from your saved search.
  3. Configure Data Enrichment:

    • In the Enterprise Security app, navigate to Configure > Data Enrichment > Asset & Identity.
    • Create a new configuration and select the lookup name you created.
  4. Map CMDB Fields:

    • Map the fields from your lookup to the corresponding CMDB fields like CRITICITY, ENVIRONMENT, FUNCTION, OFFER, BUSINESS UNIT, CODEREF, and DATACENTER.
Did this help? If yes, please consider giving kudos, marking it as the solution, or commenting for clarification — your feedback keeps the community going!
0 Karma

jarvisstark
Loves-to-Learn

You can create these CMDB fields in Splunk by using lookup tables or event-type tagging to map metadata to new hosts. If you don’t have a CMDB, consider using an asset inventory lookup or automatic field extractions in props.conf to enrich incoming data.

0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...