Field extractions for Splunk

For Incident Response to understand events from Splunk, Incident Response requires specific fields to be extracted for any source in Splunk.

Field extractions

Configure the following Field Extractions:
  • event_source: Identifier of the event source such as IP/FQDN, MAC address, node name.
  • event_resource_name: Name of the resource such as Disc, CPU.
  • severity: Severity of the event. The severity value should be between 1 to 5, where 1 is the highest and 5 is the lowest severity level.
  • event_type: Type of the event.
  • event_metric_name: Name of the metric for the alert.
  • event_message: Short description of the event or alert.
 "result": {
 "_sourcetype": "Test Splunk Error",
 "severity": "WARN",
 "_indextime": "1616430477",
 "event_resource_name": "MEMRED.ubuntu.12323",
 "source": "Test Splunk Error",
 "index": "main",
 "splunk_server_group": "",
 "eventtype": "",
 "date_zone": "local",
 "date_hour": "12",
 "_cd": "185:8",
 "date_wday": "wednesday",
 "sourcetype": "Test Splunk Error",
 "timeendpos": "47",
 "date_month": "may",
 "event_source": "A01SDED",
 "_raw": "nova-compute.log.2017-05-17_12:02:35 2017-05-17 12:01:25.139 2931 severity=WARN event_source=A01SDED,nova.virt.libvirt.imagecache,event_type=healthreport,event_resource_name=MEMRED.ubuntu.12323,event_metric_name=CPU Utilization,event_message=99% of RAM memory is used",
 "_serial": "0",
 "date_year": "2017",
 "date_second": "35",
 "_time": "1495022555",
 "_kv": "1",
 "punct": "-..--::_--_::.__=_=,...,=,=..,=_,=%_____",
 "linecount": "1",
 "date_minute": "2",
 "date_mday": "17",
 "event_message": "Test Splunk: 99% of RAM memory is used",
 "tag": "",
 "_bkt": "main~185~41B1F074-0652-444D-B530-6B5B1230CFA7",
 "_si": [
 "_eventtype_color": "",
 "splunk_server": "",
 "host": "",
 "tag::eventtype": "",
 "event_metric_name": "CPU Utilization",
 "timestartpos": "28",
 "event_type": "healthreport"
 "sid": "scheduler__airadmin__search__AllAIR_at_1616499720_69545",
 "owner": "airadmin",
 "search_name": "AllAIR",
 "results_link": "",
 "app": "search"