Splunk® Add-on Builder

Splunk Add-on Builder User Guide

This documentation does not apply to the most recent version of Splunk® Add-on Builder. For documentation on the most recent version, go to the latest release.

Create an add-on

Click Create an add-on on the Add-on Builder home page, then specify the basic properties for your add-on. These settings also determine how your add-on appears in Splunk Web.

AddonBuilder2 CreateAddon.png

Set the following properties for your project:

Add-on Name The name of the add-on.
Author The author name, which appears with the add-on in Splunk Web.
Add-on Folder Name The folder name for the add-on under $SPLUNK_HOME/etc/apps/.

Add-on folder names have a prefix of "TA-", which is a requirement for Splunk Enterprise Security add-ons. For add-ons created by Splunk, the folder name prefix is "Splunk_TA_". To change the folder name suffix, click Edit.

Version The version number of the add-on, which appears with the add-on in Splunk Web.
Description The description of your add-on.
Visible Indicates whether you want the add-on to be visible in the Splunk Web app list. By default, add-ons are not visible.
Icon Upload an image file to use as the icon for your add-on. The Add-on Builder creates a large version (72x72 pixels) and a small version (36x36 pixels) of the icon from this image.
Theme Color The color to use for your add-on.

Click Create to save your settings. The Splunk Add-on Builder displays a home page for your new add-on with the workflow for building it, including a summary of the objects you have configured. You can revisit and modify your work as needed.

700

The workflow includes the following activities, which you can access by clicking icons or by using the Add-on Builder navigation bar:

Configure Data Collection Get data into your add-on by configuring data inputs. You can also configure setup options for your add-on.
Add Sample Data Add sample data for your data inputs so that you can create knowledge object from your data.
Extract Fields Create field extractions from the data inputs you configured.
Map to CIM Map the fields from the field extractions to the common information model (CIM).
Create Alert Actions Create custom alert actions, including running an adaptive response action for Splunk Enterprise Security.
Validate & Package Validate the add-on for best practices, and test the modular/scripted inputs, field extractions, and CIM mappings. The Splunk Add-on Builder shows you any errors or warnings, along with recommendations about how to address them.

Package the add-on when you are ready to install your add-on and use it. The result is a compressed file that contains a directory with the necessary configuration files.

If a certain activity requires you to restart Splunk Enterprise, a circular arrow is displayed next to it. For example, after adding a data input, you must restart Splunk Enterprise before you can extract fields.

Last modified on 07 October, 2016
Use the Splunk Add-on Builder   Configure data collection

This documentation applies to the following versions of Splunk® Add-on Builder: 2.0.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters