CloudFabrix Documentation
Asset IntelligenceOps IntelligenceObservabilityRobotic Data
  • Getting Started
  • CloudFabrix Overview
  • AIOps Platform
  • AIOps Solutions
  • CloudFabrix RDA
    • RDA - Overview
      • RDA - Terminology and Artifacts
    • RDA - Installation
      • Linux OS
      • Windows OS
      • Mac OS
      • RDA Client
      • Worker Nodes
      • Event Gateway
      • Edge Collector
      • Log Shippers
        • Filebeat
        • Fluentd
        • Rsyslog
        • Syslog (udp)
        • Splunk forwarder (Windows and Linux)
        • Winlogbeat (Windows)
      • RDA Log Archives
    • RDA - Administration
      • RDA - Configuration
    • RDA - User Guide
      • RDA - AIOps Studio
        • AIOps Studio - Solution Packages
        • AIOps Studio - Pipelines
        • AIOps Studio - Explore
        • AIOps Studio - Administration
        • RDA CLI in UI
        • AIOps Studio - Examples
          • File Operations
          • Loop Operations
          • Data Management Operations - cfxdm
          • Data mapping - cfxdm - dm:eval
          • Filters - cfxdm - dm:filter
          • Data mapping - cfxdm - dm:map
          • Metadata - cfxdm-dm:metadata
          • Data mapping - cfxdm - dm:functions
            • Any_non_null
            • Concat
            • Datetime
            • Date and Timestamp
            • Evaluate
            • Fixed
            • Highest
            • Join
            • jsonDecode
            • Lower
            • Lowest
            • Match
            • Minutes_Between
            • Replace
            • Seconds_Between
            • Slice
            • Split
            • Strip
            • To_Numeric
            • Ts_To_Datetimestr
            • Upper
            • When_Null
          • Data Mapping cfxdm - dm:sort
          • Data Mapping cfxdm - dm:head
          • Data Mapping cfxdm - dm: tail
          • Data Mapping cfxdm - dm: dedup
          • Data Mapping cfxdm - dm:selectcolumns
          • Data Mapping cfxdm - dm:fixcolumns
          • Data Mapping cfxdm - dm:mergecolumns
          • Data Mapping cfxdm - dm:describe
          • Data Mapping cfxdm - dm:save
          • Data Mapping cfxdm - dm:savedlist
          • Data Mapping cfxdm - dm:recall
          • Data Mapping cfxdm - dm:concat
          • Data Mapping cfxdm - dm:groupby
          • Data Mapping cfxdm - dm:to_type
          • Data Mapping cfxdm - dm:enrich
          • Data Mapping cfxdm - dm:dns_ip_to_name
          • Data Mapping cfxdm - dm:dns_name_to_ip
        • AIOps Studio - Datasource Examples
          • Elasticsearch (v1)
      • RDA - Data Management (cfxdm)
        • cfxdm - dm:filter
        • cfxdm - dm:map
        • cfxdm - dm:functions
        • cfxdm - dm:sort
        • cfxdm - dm:head
        • cfxdm - dm:tail
        • cfxdm - dm:dedup
        • cfxdm - dm:selectcolumns
        • cfxdm - dm:mergecolumns
        • cfxdm - dm:describe
        • cfxdm - dm:hist
        • cfxdm - dm:bin
        • cfxdm - dm:fixcolumns
        • cfxdm - dm:save
        • cfxdm - dm:savedlist
        • cfxdx - dm:recall
        • cfxdm - dm:concat
        • cfxdm - dm:groupby
        • cfxdm - dm:enrich
        • cfxdm - dm:to_type
        • cfxdm - dm:dns_ip_to_name
        • cfxdm - dm:dns_name_to_ip
        • cfxdm - files:loadfile
      • RDA Terminal
        • Examples using Terminal / Commandline
    • RDA - Bot Documentation
    • RDA - Datasource Integrations
      • AppDynamics
      • Dynatrace
      • Dell EMC Unity
      • Elasticsearch
      • Infoblox NetMRI
      • Kubernetes Cluster
      • Linux OS
      • Microsoft Windows Server OS
      • Nagios XI
      • NetApp Clustered ONTAP
      • PRTG Network Monitor
      • VMware vCenter
      • VMware vRealize Operations
    • RDA - Python API
      • Class CaaSDataset
      • Class CaaSClient
      • Python API Example
    • RDA - FAQ
      • Download and Installation
      • Troubleshooting
  • CFXQL - CFX Query Language
    • CFXQL User Interface
  • Operations Intelligence Analytics (OIA)
    • Solution Overview
      • Navigating cfxOIA
      • Any title
    • Administration Guide
      • Active Directory Integration
      • Add Customer
      • First Steps
      • OIA Users
      • Add New Users and Assign Roles
      • Add Environment
      • Add Gateway
      • Add DataSource
      • Add Project
      • Project Configuration
      • Stacks
      • Teams
    • User Guide
      • Incidents
        • Incident
        • Stack
      • Alerts
      • Outcomes
  • INTEGRATIONS
    • Zabbix
    • AppDynamics
    • Dynatrace
    • NetApp C Mode
    • NetApp 7 Mode
    • Splunk Enterprise
    • VMware vCenter
  • OBSERVABILITY
  • Observability - IT Infrastructure Monitoring (cfxPulse)
    • Getting Started
    • Solution Overview
    • Installing cfxPulse Collector
    • Administrator Quick Start Guide
      • Prerequisites
      • Accessing cfxPulse
      • Configuration of cfxPulse
      • Setting Up Monitoring
      • Monitoring Using Prometheus Agents
      • How to add Prometheus Agent Details
      • Discovery of Devices
      • Monitoring Dashboard
    • End User Quick Start Guide
      • Portal Navigation
      • Monitoring Analysis
      • Monitoring
      • Alerts and Incidents
      • Reports
      • NOC/Ops
      • Configuration Backups
      • Interacting With Tabular Reports
      • Creating Custom Dashboards
  • Observability - Log Monitoring & Analytics (CFX LogAnalytics or CLA)
    • Getting Started
    • Solution Overview
    • Solution Key Components
    • Log Forwarding
      • Install and Configure Logstash
      • Sending Logs to Logstash Forwarder
    • Log Collection
      • Collecting Logs from Linux
    • Log Transformation & Enrichment
    • Logstash Installation
      • How to install Java / Logstash on client side
  • Asset Intelligence Analytics (AIA) Solution
    • Getting Started
    • Solution Overview
    • AIA Roles
      • Platform Admin
        • Managed Service Provider (MSP)
        • Authentication Server
        • Set Up Services
        • Organizations
        • Users
      • Organization Admin
        • My Organizations
      • Organization Executive
      • Organization User
    • AIA Tasks, Functions
      • Home Page Navigation
      • Filters
      • Settings Menu
      • Notifications
      • Authentical Server
      • How to Add, Edit, Delete MSP
      • Actions
        • Services
        • Files
        • Dictionaries
        • Discovery Jobs
        • Snapshots
        • Clambda Jobs
        • State Operations
        • Replacement Rate
      • Details
        • Overall
        • POR Insights
        • HW Assets
        • SW Assets
        • Contracts
        • App Dependency
        • Asset List
    • AIA API
    • Enterprise Discovery
      • cfxEdgeCollector
        • Deployment of cfxEdgeCollector
        • Configuration of cfxEdgeCollector
        • cfxEdgeCollector Command Line Options
        • cfxEdgeCollector Help Command
        • Working With cfxEdgeCollector
        • cfxEdgeCollector Auto Export
    • Asset Intelligence & Analytics (AIA) (Delete)
  • CloudFabrix SaaS
    • Signup
    • Navigation
    • User Roles
  • Support
    • Contact Support
Powered by GitBook
On this page
  • Prerequisites:
  • Addition of Splunk Enterprise as DataSource
  • Adding Splunk Enterprise Data Source in the Incident Room
  • Creating Alert Source for Splunk Enterprise
  • Table describing the field mappings between Splunk Alert Payload and Alert Watch Fields.
  1. INTEGRATIONS

Splunk Enterprise

Splunk Enterprise as Data Source

Prerequisites:

  1. Splunk Enterprise Version 8.0.0

  2. Splunk Indexes (Please refer Splunk Documentation on how to create indexes)

    a. Eg: Webserver host logs created with log index “web_error_logs” with field values hostname, severity, ipaddress etc...

    b. DB Server host logs created with log index “db_error_logs” with field values hostname, severity, ipaddress etc...

Note-1: For field “severity”, you can extract from the log message (Eg: info, error, warn, debug etc)

Note-2: Fields “hostname” and “ipaddress” should be the HostName and IP address of the host on which Splunk agent is installed and collecting the OS or Application logs.

To add the above custom fields on Splunk Agent follow the below steps (Linux version).

cd /opt/splunkforwarder/etc/system/local
Edit inputs.conf
Add the below line to add additional fields
_meta = key1::value1 key2::value2
Eg: _meta = ipaddress::10.95.131.23 hostname::cfx-wpress-db01.demo.cloudfabrix.com
Restart splunk agent
/opt/splunkforwarder/bin/splunk stop
/opt/splunkforwarder/bin/splunk start

3. Enable API port 8089 on Splunk Enterprise administration UI

Enabling API Port 8089

Step 1: Log into Your Splunk Enterprise Instance with admin credentials

Step 2: From Top Menu bar, click on 'Settings' tab.

Step 3: Click on 'Server Settings' and then on Server Settings screen, click on "General Settings".

Step 4: For creating a data source plugin in CloudFabrix OIA, Management Port needs to 8089 and enter value as shown below.

Addition of Splunk Enterprise as DataSource

Step 1: Login to cfxDimensions with user credentials.

Step 2: Under Data Sources App, select '+' on top right corner to add new Data Sources.

Step 3: Select 'Splunk' as Data Source Type as shown.

Enter the required details. The details required are

HostName: Splunk Enterprise System IP address

UserName: Username with admin rights

Password: Specify the password for the admin user

Port: API access port configured in previous section from Splunk Enterprise Instance (default: 8089)

TimeOut: The time required to wait for the response.

Note: Please chose https over http as http is not supported by Splunk.

Adding Splunk Enterprise Data Source in the Incident Room

Step 1: Login to cfxDimensions App and then click on OIA App.

Step 2: After creation of Data Source, add it under incident room creation.

Step 3: An incident gets created from Splunk Instance. You can also create new incidents.

Step 4: Click on Incident / ticket.

You data source widget chart (App Logs From Splunk) is as displayed below.

The fields (Timestamp-> time, Type->sourcetype, Message-> _raw)

Note: time, sourcetype, raw are Splunk index fields that are required to be present in the index.

Creating Alert Source for Splunk Enterprise

Step 1: Login to cfxDimensions and then select 'OIA app'.

Step 2: Select the Incident room where you want to add the alert source.

Step 3: Under Alerts tab, select Alert Sources on the right hand side corner as shown.

Step 4: Click on '+' to add new Alert Source as shown.

Step 5: Select Alert Source Type 'SplunkEnterprise' as shown.

Enter your cfxDimensions system DNS name or IP address as External IP address and 'inbound-alerts' at Topic field.

Click Save.

Step 6: From Alert Sources, select the hamburger menu on created source and click on View Details as shown.

The Details are as shown below.

Step 7: Copy the displayed URL in view details which follows the format "https://<Your cfxDimensions Platform IP>/webhooks/hookid/<uuid>/".

Step 8: Login to Splunk Enterprise Instance

Step 9: Go to 'Search and Reporting' section.

Step 10: Create new search from the pre-requisite index mentioned earlier in the document. Make sure you have the required field values mentioned. For example, Eg index = db_error_logs, host = *ip address*

Step 11: Save the search as alert

Step 12: While creating alert, the following 'Save As Alert' is displayed.

Select 'Webhook' from Actions drop down. Paste webhook url from earlier alert source. Enter alert name and any conditions.

Save the Alert.

Step 13: The alert can be viewed or edited from under the Alerts tab.

Step 14: It takes a while before alert is displayed in the OIA app which in turn creates it as an incident.

Step 15: These can be viewed in OIA app under alert tab.

Login as Customer Admin User into cfxDimensions App.

An example alert payload from Splunk is as shown below

{
  "search_name": "web logs alerts",
  "owner": "admin",
  "sid": "rt_scheduler__admin__search__RMD549d1c662f912271f_at_1577189234_887.781204",
  "result": {
    "_sourcetype": "cfx-error-log",
    "_time": "1578399544.002748",
    "date_mday": "7",
    "_kv": "1",
    "punct": "[___::._]_[:]_[_]_[_...:]__'/////.'______",
    "severity": "error",
    "_serial": "1815613",
    "index": "web_error_logs",
    "linecount": "",
    "sourcetype": "cfx-error-log",
    "date_month": "january",
    "_confstr": "source::/var/log/httpd/cfx-error-log|host::cfx-wpress-web01|10.95.131.22|cfx-error-log",
    "ipaddress": "10.95.131.22",
    "source": "/var/log/httpd/cfx-error-log",
    "timeendpos": "32",
    "_eventtype_color": "",
    "date_minute": "19",
    "pid_id": "16494",
    "splunk_server": "splunk-vm01",
    "hostname": "cfx-wpress-web01.demo.cloudfabrix.com",
    "_raw": "[Tue Jan 07 04:19:04.002748 2020] [:error] [pid 16494] [client 10.95.122.127:43968] script '/var/www/html/wordpress/myapp323.php' not found or unable to stat",
    "date_second": "4",
    "date_zone": "local",
"_subsecond": ".002748",
    "date_wday": "tuesday",
    "host": "cfx-wpress-web01|10.95.131.22",
    "eventtype": "",
    "timestartpos": "5",
    "_indextime": "1578399544",
    "date_hour": "4",
    "date_year": "2020",
    "_si": [
      "splunk-vm01",
      "web_error_logs"
    ]
  },
  "results_link": "http://splunk-vm01:8000/app/search/@go?sid=rt_scheduler__admin__search__RMD549d1c662f912271f_at_1577189234_887.781204",
  "app": "search"
}

Table describing the field mappings between Splunk Alert Payload and Alert Watch Fields.

Splunk Fields

Alert Watch Fields

Comments

Mandatory

Description

_time

raisedAt

YES

Time of the alert raised

host

assetId

YES

Asset Identifier

hostname

assetName

YES

Hostname of the asset

host

assetType

YES

Type of the Asset

ipaddress

assetIpAddress

YES

IP Address of the asset

sourcetype

alertType

YES

Type of the alert

sourcetype

alertCategory

YES

Category of the alert

sourcetype

componentId

YES

Component Identifier

source

componentName

YES

Name of the Component

severity

severity

YES

Alert Severity Ordered Number 0 - Critical, 1 - Major, 3 - Minor,

_raw

message

YES

Alert Payload

index

sourceId

YES

Identifier of the alert from the source system

  1. Raised At : This field describes the time at which the alert was last occurred . Eg - The last occurred time on the incident ticket . (08/01/2020, 15:05:12)

  2. Asset Id : This field uniquely Identifies an asset Eg (cfx-wpress-web01.demo.cloudfabrix.com) or Any UUID

  3. Asset Name : This field describes the host name of the Device where alert is coming from, (Eg any FQDN (cfx-wpress-web01.demo.cloudfabrix.com)

  4. Asset Type: The Type of the device that is raising alert .Here in this case ‘cfx-error-log’

  5. Asset IP Address : The ip address of the device where the alert was raised form Eg (10.95.131.22)

  6. Alert Category : The Type of the alert that device raises. In case of Splunk its same as the sourcetype of the log i.e ‘cfx-error-log’

  7. Component Id : An unique identifier which identifies the sub component form the log messages. Eg In Logs the Source of the log messages

  8. Component Name: The name of the Component (‘the path of the source log message’)

  9. Severity: Alert Severity Ordered Number 0 - Critical, 1 - Major, 3 - Minor,

  10. Message : This field describes the Log messages

  11. SourceId : ‘The index form the splunk logs’

PreviousNetApp 7 ModeNextVMware vCenter

Last updated 5 years ago

Management Port = 8089
Add new data source
Splunk as Data Source
Add Project
Splunk Incident
Select Alert Sources
Click '+' to add new alert source
Selecting Splunk Enterprise as Data Source

Note: More information on Splunk alerts can be read ().

here
https://docs.splunk.com/Documentation/SplunkCloud/8.0.1/Alert/Aboutalerts