Splunk® Add-on Builder

Splunk Add-on Builder User Guide

This documentation does not apply to the most recent version of Splunk® Add-on Builder. For documentation on the most recent version, go to the latest release.

Map to CIM

In Map to CIM, map the fields from your data to the fields in one of the predefined common information models (CIM) to normalize data at search time.

The Splunk Common Information Model add-on is required to use this feature.

Add an event type

Before you can map fields, you need to create an event type to generate events from which to extract fields.

For each source type for which you want to map fields, add an event type:

  1. On your add-on homepage, click Map to CIM on the Add-on Builder navigation bar.
  2. On the Map to CIM page, click Add Event Type.
  3. Enter a name for the event type, and select a source type from which to generate events.
  4. In the search bar, enter a search to select events:
  5.    * Enter "*" to select all events for the source type. 
       * Apply additional search criteria as needed. 
    
  6. Click Save.

AddonBuilder2 EventType.png

The Add-on Builder returns to the Map to CIM page, and you can now map events from this event type to the CIM.

Map events to the CIM

Map events from an event type to the CIM:

  1. On your add-on homepage, click Map to CIM on the Add-on Builder navigation bar.
  2. On the Map to CIM page, select an event type. Fields from this event type appear in the list of event fields.
  3. Select an event field.
  4. Select a CIM from the list of pre-defined CIM data models.
  5. Select a CIM field that you want to map to the event field.
  6. Optionally, click Eval to apply an eval statement to the mapping. Enter the eval string and click Submit.
  7. Click Map. The CIM mapping appears in the list.

AddonBuilder2 MapToCIM.png

Repeat this procedure for all of the fields you want to map.

Learn more

For more information, see the following Splunk Enterprise documentation:

Last modified on 04 October, 2016
Extract fields   Create alert actions

This documentation applies to the following versions of Splunk® Add-on Builder: 2.0.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters