Hello, I'm having trouble to read the NetApp CIFS Audit logs with the NetApp StorageGRID App for SPlunk.
I'm using the standard CIFS audit log configuration settings recommended by NetApp in the Filer:
FAS2020-F1> options cifs.audit
cifs.audit.account_mgmt_events.enable off
cifs.audit.autosave.file.extension timestamp
cifs.audit.autosave.file.limit 20
cifs.audit.autosave.onsize.enable on
cifs.audit.autosave.onsize.threshold 75%
cifs.audit.autosave.ontime.enable off
cifs.audit.autosave.ontime.interval 1d
cifs.audit.enable on
cifs.audit.file_access_events.enable on
cifs.audit.liveview.allowed_users
cifs.audit.liveview.enable off
cifs.audit.logon_events.enable off
cifs.audit.logsize 5000000
cifs.audit.nfs.enable off
cifs.audit.nfs.filter.filename
cifs.audit.saveas /vol/vol0/Share/CIFS_Audit/CIFS_Audit_log.evt
I have too a shared folder in the filer to access to the logs from the Splunk Server side.
But the log files generated by the NetApp Filer are in "Windows Event" format and seems that the StorageGRID App can't process them.
I have seen too in the StorageGRID App folder an example log that it's in a text format that I can't match like a CSV file.
What are the log format types supported by the StorageGRID App?
If they are not in the native format used by the NetApp FIler, what is your preferred method to convert them to be compatible with StorageGRID App?
Thanks,
Joseph Lopez
... View more