Hi all,
I'm VERY new to Splunk and I'm trying to learn. I have a RPi running dnsmasq on my home network and have it sending it's DHCP and DNS queries to Splunk. I've already done some field extractions and it's coming along very nicely. It's pretty cool. 🙂
My problem is that I have a LOT of android devices on my network and they all show up with a name of android-XXXXXXXXXXXX. I created a lookup table with the android names and which devices they are. I created an Automatic Lookup for both the DHCP and DNS sourcetypes. For DHCP, it's working great. For my DNS data, I'm also using dnslookup to translate the name from the ip of the device that issued the query. Here Automatic lookups are not working.
If I add the lookup command it's fine.
sourcetype=dnsmasq:dns
| lookup dnslookup clientip as client_ip OUTPUT clienthost as client_fqdn
| eval client_name=replace(client_fqdn, ".mydomain.net", "")
| search client_name=android*
| lookup device_lookup client_name
| table _time, query_type, query, client_name, device_owner, device_model
But without it, it does not show anything for device_owner or device_model.
sourcetype=dnsmasq:dns
| lookup dnslookup clientip as client_ip OUTPUT clienthost as client_fqdn
| eval client_name=replace(client_fqdn, ".mydomain.net", "")
| search client_name=android*
| table _time, query_type, query, client_name, device_owner, device_model
My assumption is that the automatic lookup is trying to happen before the dnslookup. I've even made my lookup table accept wildcards so that I don't need the eval command to strip the domain name, but that still didn't work.
Any help would be appreciated!
... View more