Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

Splunk default fields

Splunk server adds the following default fields to each event in every index.

Field Name

Description

Values/Range

Anchor
date_hour
date_hour
date_hour

Indicates the hour when an event occurred. To narrow your search for specific event timestamps, you can use the default datetime fields. Click here for more information on datetime fields.

Range: 0-23

Anchor
date_mday
date_mday
date_mday

Indicates the day of the month when the event occurred

Range: 1-31

Anchor
date_minute
date_minute
date_minute

Indicates the exact minute when the event occurred

Range: 0-59

Anchor
date_month
date_month
date_month

Indicates the month during which an event occurred


Anchor
date_second
date_second
date_second

Indicates the second in which an event occurred

Range: 0-59

Anchor
date_wday
date_wday
date_wday

Indicates the day of the week in which an event occurred

Example: Sunday, Monday, etc.

Anchor
date_year
date_year
date_year

Indicates the year in which an event occurred


Anchor
date_zone
date_zone
date_zone

Indicates the time for the local timezone of an event, expressed as hours in Unix Time


Anchor
eventtype
eventtype
eventtype

Indicates events of the same type based on a given search. Click here for more information

Example: splunkd-log

Anchor
host
host
host

Contains information about the originating hostname or a network IP address that generates the event

Example: reporting-1.com

Anchor
index
index
index

Contains the name of the index with which a given event is indexed

Example: ib_dns_summary

Anchor
linecount
linecount
linecount

Contains information about the number of lines in an event before it is indexed

Example: 1

Anchor
punct
punct
punct

Contains information about the pattern of the first thirty punctuation characters in the first line of the event with which it is associated. It shows how an event looks when all letters, numbers, and spaces are removed and contains characters such as periods, colons, parentheses, quotes, question marks, dashes, and underscores. Click here for more information.

Wiki Markup
Example: -_::._\[\]:___.../_=

Anchor
source
source
source

Contains the name of the file, stream, or other input details from which the event originates

Example: si-search-dns-query-reply

Anchor
sourcetype
sourcetype
sourcetype

Specifies the format of data input from which the event originates

Stash

Anchor
splunk_server
splunk_server
splunk_server

Contains the name of the Splunk server that comprises the event

Example: reporting-2.com-2-slave

Anchor
splunk_server_group
splunk_server_group
splunk_server_group

Contains the name of the Splunk server group

String


Anchor
_Commonly_extracted_fields
_Commonly_extracted_fields
Commonly extracted fields


Field Name

Description

Values/Range

Source of Data

Anchor
EA
EA
EA

Specifies the extensible attribute

String

'__grouping_by_ea_tag_lookup' lookup from /storage/splunk/etc/apps/infoblox/lookups/grouping_by_ea_tag_map.csv with 'host' value as input OR'pool_ea_lookup_csv' lookup from /storage/splunk/etc/apps/infoblox/lookups/idns_pools.csv with 'pool' value as inputOR'resource_pool_ea_lookup_csv' lookup from /storage/splunk/etc/apps/infoblox/lookups/idns_resources.csv with 'RESOURCE' value as inputOR'network_ea_lookup_csv' lookup from /storage/splunk/etc/apps/infoblox/lookups/network.csv with 'NETWORK' value as input

Anchor
HWTYPE
HWTYPE
HWTYPE

Specifies the hardware type

Example: IB-4030

nios_member_hw_lookup' lookup from /storage/splunk/etc/apps/infoblox/lookups/nios_member_hw.csv with 'host' value as input.

Anchor
MAX_DB_OBJECTS
MAX_DB_OBJECTS
MAX_DB_OBJECTS

Specifies the maximum objects in the database for a host


'nios_member_hw_lookup' lookup from /storage/splunk/etc/ap. Example: 8000000.

Anchor
MAX_DHCP_LPS
MAX_DHCP_LPS
MAX_DHCP_LPS

Specifies the maximum number of DHCP leases per second for a host

Example: 15.0

'nios_member_hw_lookup' lookup from /storage/splunk/etc/apps/infoblox/lookups/nios_member_hw.csv with 'host' value as input.

Anchor
MAX_DNS_QPS
MAX_DNS_QPS
MAX_DNS_QPS

Specifies the maximum DNS queries per second for a host

Example: 1000000.0

'nios_member_hw_lookup' lookup from /storage/splunk/etc/apps/infoblox/lookups/nios_member_hw.csv with 'host' value as input.

Anchor
Member_IP
Member_IP
MEMBER_IP

Specifies the IP address of the member

IP address

'nios_member_ip_lookup' lookup from /storage/splunk/etc/apps/infoblox/lookups/nios_member_ip.csv with 'host' value as input

Anchor
timeendpos
timeendpos
timeendpos

Specifies the byte at which the timestamp ends. These values are based on the TIME_FORMAT that is specified for a sourcetype under props.conf.

Example: 26


Anchor
timestartpos
timestartpos
timestartpos

Specifies the byte at which the timestamp starts

Example: 0


...

Infoblox Discovered Devices related dashboards/reports

Extracted Field NameDescription of the fieldValues/RangeSource of Data
ADM_DN_OP_DN_COUNTAdmin-Down/Operation-DownPort CountInteger

Infoblox discovered devices related
dashboards/reports

ADM_UP_OP_DN_COUNTAdmin-Up/Operation-UpPort CountInteger

Infoblox discovered devices related
dashboards/reports

ADM_UP_OP_UP_COUNTAdmin-Up/Operation-DownPort CountInteger

Infoblox discovered devices related
dashboards/reports

COMPONENT_NAMESpecifies the component nameString. Example: DELL-PC8024F

Infoblox discovered devices related
dashboards/reports

COMPONENT_TYPESpecifies the component typeString. Example: Switch-Router

Infoblox discovered devices related
dashboards/reports

COMPONENT_PORTSpecifies the component portString. Example: Gi1/0/24

Infoblox discovered devices related
dashboards/reports

DEVICE_MGMT_IPSpecifies the device management IP addressIP address

Infoblox discovered devices related
dashboards/reports

DEVICE_MODELSpecifies the device modelString. Example: EX2200

Infoblox discovered devices related
dashboards/reports

DEVICE_NAMESpecifies the device nameString. Example: Cisco_434f44

Infoblox discovered devices related
dashboards/reports

DEVICE_TYPESpecifies the device typeString. Example: Switch, Router

Infoblox discovered devices related
dashboards/reports

DEVICE_VENDORSpecifies the device vendorString. Example: Avaya

Infoblox discovered devices related
dashboards/reports

DISCOVERED_MAC_DUIDSpecifies the discovered MAC DUIDMAC address

Infoblox discovered devices related
dashboards/reports


DISCOVERED_NAME
Specifies the discoverd nameExample: dev_view1.yahoo.com

Infoblox discovered devices related
dashboards/reports

EACommon Extracted fields

HWTYPECommon Extracted fields

IN_USE_FLAGIn use flagInteger. Example: 1

Infoblox discovered devices related
dashboards/reports

IPADDRSpecifies the IP addressIP Address. Example: 11.11.11.11

Infoblox discovered devices related
dashboards/reports

IPADDR_MASKSpecifies the IP address maskInteger. Example: 128

Infoblox discovered devices related
dashboards/reports

MAC_DUIDSpecifies the MAC addressMAC address

Infoblox discovered devices related
dashboards/reports

MAX_DB_OBJECTSCommon Extracted fields

MAX_DHCP_LPSCommon Extracted fields

MAX_DNS_QPSCommon Extracted fields

MEMBER_IPCommon Extracted fields

NETWORK_VIEWSpecifies the network viewString. Example: default

Infoblox discovered devices related
dashboards/reports

NON_NULL_NAMESpecifies the non-null nameString. Example: DELL-PC8024FEvaluated from the COMPONENT_NAME field
NON_NULL_PORTSpecifies the non-null portString. Example: Gi1/0/24Evaluated from COMPONENT_PORT field
TIMESTAMPSpecifies the timestampTimestamp. Example: 2017-02-15 15:56:27

Infoblox discovered devices related
dashboards/reports

TIMESTAMP_USER_HOST_

PROCESS_PID_INFO_PREFIX

Specifies the timestamp userhost process pid info prefixString. Example: 2017-02-15T11:02:53+00:00 user infoblox.localdomain
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e5d51f7e-f354-4235-870a-9e02f49b3d41"><ac:plain-text-body><![CDATA[python[]: info ipaddr-activity-rpt

Infoblox discovered devices related
dashboards/reports

TOTAL_AVAIL_COUNTSpecifies the total available countInteger

Infoblox discovered devices related
dashboards/reports

TypeSpecifies the typeString. Example: Discovery

'ipaddr_mask_lookup' lookup from /storage/splunk/etc/apps/infoblox
/lookups/ipaddr_mask_lookup.csv with
'IPADDR_MASK'


value as input

ap_bss_macAccess Point BSS MACMAC addressInfoblox discovered devices related
dashboards/reports
ap_ip_dottedAccess Point IP dottedStringInfoblox discovered devices related
dashboards/reports
ap_macAccess Point MACMAC addressInfoblox discovered devices related
dashboards/reports
ap_nameAccess Point nameStringInfoblox discovered devices related
dashboards/reports
ap_associated_ssidAccess Point associated SSIDStringInfoblox discovered devices related
dashboards/reports
asset_typeSpecifies the asset typeString. Example: Physical DeviceInfoblox discovered devices related
dashboards/reports
classSpecifies the class nameString. Example: portInfoblox discovered devices related
dashboards/reports
component_nameSpecifies the component nameString. Example: GigabitEthernet1/0/1Infoblox discovered devices related
dashboards/reports
date_hourSplunk Default field

date_mdaySplunk Default field

date_minuteSplunk Default field

date_monthSplunk Default field

date_secondSplunk Default field

date_wdaySplunk Default field

date_yearSplunk Default field

date_zoneSplunk Default field

DescriptionSpecifies the descriptionString. Example: Gigabit Ethernet PortInfoblox discovered devices related
dashboards/reports
device_idSpecifies the device IDIntegerInfoblox discovered devices related
dashboards/reports
device_ip_addressSpecifies the device IP addressIP addressInfoblox discovered devices related
dashboards/reports
device_modelSpecifies the device modelString. Example: catalyst37xxStackInfoblox discovered devices related
dashboards/reports
device_nameSpecifies the device nameString. Example:DELL-PC8024FInfoblox discovered devices related
dashboards/reports
device_os_versionSpecifies the device OS versionString. Example: 4.14.6MInfoblox discovered devices related
dashboards/reports
device_typeSpecifies the device typeString. Example: SwitchInfoblox discovered devices related
dashboards/reports
device_vendorSpecifies the device vendorString. Example: CiscoInfoblox discovered devices related
dashboards/reports
device_versionSpecifies the device versionString. Example: 5.1.2.3Infoblox discovered devices related dashboards/reports
display_nameSpecifies the DNS viewStringInfoblox discovered devices related dashboards/reports
end_host_addl_infoSpecifies additional information about the end hostStringInfoblox discovered devices related dashboards/reports
end_host_device_modelSpecifies the device model of the end hostString. Example: catalyst37xxStackInfoblox discovered devices related dashboards/reports
end_host_device_typeSpecifies the device type of the end hostString. Example: Switch-RouterInfoblox discovered devices related dashboards/reports
end_host_device_vendorSpecifies the device vendor of the end hostString. Example: CiscoInfoblox discovered devices related dashboards/reports
end_host_first_discoveredSpecifies the first occasion when the end host was first discoveredIntegerInfoblox discovered devices related dashboards/reports
end_host_ip_addressSpecifies the IP address of the end hostIP addressInfoblox discovered devices related dashboards/reports
end_host_last_discoveredIndicates when was end host last discoveredIntegerInfoblox discovered devices related dashboards/reports
end_host_mac_addressSpecifies the MAC address of the end hostMAC addressInfoblox discovered devices related dashboards/reports
end_host_nameSpecifies the name of the end hostString. Example: WS-C3750X-24PInfoblox discovered devices related dashboards/reports
end_host_network_viewSpecifies the network view of the end hostString. Example: custom viewInfoblox discovered devices related dashboards/reports
end_host_os_versionSpecifies the version of the end host OSString. Example: 15.2(1)E2Infoblox discovered devices related dashboards/reports
eventtypeSplunk Default field

firmware_revIndicates firmware revisionString. Example: 15.2(1)E2Infoblox discovered devices related dashboards/reports
first_seenFirst seen timestampIntegerInfoblox discovered devices related dashboards/reports
hardware_revSpecifies revision of the hardwareString. Example: V05Infoblox discovered devices related dashboards/reports
hostSplunk Default field

indexSplunk Default field

interface_admin_statusSpecifies the interface admin statusString. Example: upInfoblox discovered devices related dashboards/reports
interface_descriptionSpecifies the interface interface descriptionStringInfoblox discovered devices related dashboards/reports
interface_ip_addressSpecifies the interface IP addressIP addressInfoblox discovered devices related dashboards/reports
interface_nameSpecifies the interface nameString. Example: Fa0Infoblox discovered devices related dashboards/reports
interface_port_statusSpecifies the interface port statusString. Example: upInfoblox discovered devices related dashboards/reports
interface_speedSpecifies the interface speedInteger. Example: 1000000000Infoblox discovered devices related dashboards/reports
interface_typeSpecifies the interface typeString. Example: tunnelInfoblox discovered devices related dashboards/reports
interface_vlanSpecifies the interface VLAN IDInteger Example: 16Infoblox discovered devices related dashboards/reports
interface_vlan_nameSpecifies the interface VLAN nameString. Example: VLAN1014Infoblox discovered devices related dashboards/reports
ip_addressSpecifies the IP addressIP addressInfoblox discovered devices related dashboards/reports
is_trunk_portSpecifies if it is a trunk port or notBooleanInfoblox discovered devices related dashboards/reports
last_seenSpecifies the last seen timestampIntegerInfoblox discovered devices related dashboards/reports
linecountSplunk Default field

modelSpecifies the model nameString. Example: DCS-7048T-AInfoblox discovered devices related dashboards/reports
network_viewSpecifies the network viewString. Example: custom viewInfoblox discovered devices related dashboards/reports
port_last_changed_atThe timestamp when the port was last changedTimestampInfoblox discovered devices related dashboards/reports
punctSplunk Default field

serial_numberSpecifies the serial numberString. Example: JPE12440180Infoblox discovered devices related dashboards/reports
software_revSpecifies the software revisionString. Example: 15.2(1)E2Infoblox discovered devices related dashboards/reports
sourceSplunk Default field

sourcetypeSplunk Default field

splunk_serverSplunk Default field

splunk_server_groupSplunk Default field

switch_interfaceSpecifies the switch interfaceString. Example: Gi0/47Infoblox discovered devices related dashboards/reports
switch_ip_addressSpecifies the switch IP AddressIP AddressInfoblox discovered devices related dashboards/reports
switch_modelIndicates the switch modelString. Example: cat3560x48Infoblox discovered devices related dashboards/reports
switch_nameSpecifies the switch nameString. Example: ni-mri-sw4.inca.infoblox.comInfoblox discovered devices related dashboards/reports
switch_os_versionSpecifies the OS version of the switchString. Example: 12.2(53)SE2Infoblox discovered devices related dashboards/reports
switch_typeSpecifies the switch typeString. Example: SwitchInfoblox discovered devices related dashboards/reports
switch_vendorSpecifies the vendor of the switchString. Example: CiscoInfoblox discovered devices related dashboards/reports
switch_vlanSpecifies the switch VLANInteger. Example: 18Infoblox discovered devices related dashboards/reports
timeendposCommon extracted fields

timestampIndicates the timestampIntegerInfoblox discovered devices related dashboards/reports
timestamp_user_host_process_pid_info_prefixSpecifies the prefixStringInfoblox discovered devices related dashboards/reports
timestartposCommon extracted fields

user_idSpecifies the User ID
Infoblox discovered devices related dashboards/reports
ViewSpecifies the DNS viewStringInfoblox discovered devices related
dashboards/reports
virtual_indSpecifies the virtual indicatorInteger

Infoblox Threat Protection related dashboards/reports

...

Extracted Field NameDescription of the fieldReportsValues/RangeSource of DataRemarks
CLIENTSpecifies the IP address of the DNS client
Example: 10.39.18.60

COUNTSpecifies the count of DNS queriessi_dns_top_clientsInteger


Specifies the count of SERVFAIL errors that are received for DNS clientssi_top_servfail_received_queriesInteger


Specifies the count of NXDOMAIN/NOERROR replies for DNS clientssi_top_nxdomain_queryInteger


Specifies the count of DNS domain name requestssi_dns_requested_domainInteger


Specifies the count of DNS queries per secondsi_dns_qps_trendInteger


Specifies the count of DNS SERVFAIL errors that are sent for DNS queriessi_top_servfail_sent_queriesInteger


Specifies the count of DNS timed-out recursive queriessi_top_timeout_queriesInteger


Specifies the average count of DNS RPX hitssi_dns_rpz_hitsInteger


Specifies the count of DNS clients per domainsi_top_clients_per_domainInteger

EACommon Extracted fields



FQDNSpecifies the fully qualified domain namesi_dns_requested_domain,
si_top_clients_per_domain
Example: 213.31.102.10.in-addr.arpa

HWTYPECommon Extracted fields



MAX_DB_OBJECTSCommon Extracted fields



MAX_DHCP_LPSCommon Extracted fields



MAX_DNS_QPSCommon Extracted fields



MEMBERSpecifies the member
StringInfoblox DNS Summary
MEMBER_IPCommon Extracted fields



TLDSpecifies top level domain namessi_dns_requested_domainExample: arpa

TYPESpecifies the DNS response typesi_dns_query_reply,
si_dns_qps_trend,
si_ddns_update
SUCCESS/NOERROR or
REFERRAL or
NXRRSET or
NXDOMAIN or
REFUSED or
OTHER


VIEWIt refers to the DNS view key to map DNS view through lookup. See display_name field.si_dns_requested_domain,
si_dns_top_clients,
si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend,
si_dns_qps_trend,
si_ddns_update,
si_dns_cache_hit_ratio,
si_dns_rpz_hits,
si_top_clients_per_domain,
si_top_timeout_queries,
si_top_servfail_sent_queries,
si_top_nxdomain_query,
si_top_servfail_received_queries
Example: _default

date_hourSplunk Default field



date_mdaySplunk Default field



date_minuteSplunk Default field



date_monthSplunk Default field



date_secondSplunk Default field



date_wdaySplunk Default field



date_yearSplunk Default field



date_zoneSplunk Default field



display_nameSpecifies the DNS viewsi_dns_requested_domain,
si_dns_top_clients,
si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend,
si_dns_qps_trend,
si_ddns_update,
si_dns_cache_hit_ratio,
si_dns_rpz_hits,
si_top_clients_per_domain,
si_top_timeout_queries,
si_top_servfail_sent_queries,
si_top_nxdomain_query,
si_top_servfail_received_queries
Example: default.MS-2016
Lookup from dns_viewkey_displayname.csv using the VIEW field value.
eventtypeSplunk Default field



hostSplunk Default field



indexSplunk Default field



info_max_timeCommon summary index fields



info_min_timeCommon summary index fields



info_search_timeCommon summary index fields



linecountSplunk Default field



orig_hostSpecifies the host name of the data source
Example: infoblox.com
Splunk added default field
psrsvd_ct_COUNTHere, ct = count.
Contains the count information for the COUNT field.
si_dns_query_reply,si_dns_qps_trend

Splunk added special field
psrsvd_ct_LATENCYContains the count information for the LATENCY fieldsi_dns_response_latency_trend

Splunk added special field
psrsvd_ct_QCOUNTContains the count information for the QCOUNT fieldsi_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend


Splunk added special field
psrsvd_gcHere, gc = group count. It indicates the count for stats "grouping" and it is not scoped to a single field.si_dns_query_reply,
si_dns_response_latency_trend,
si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend,
si_dns_qps_trend


Splunk added special field
psrsvd_nc_COUNTHere, nc = numerical count. It indicates the number of numerical values and contains the numerical count information for the COUNT field.si_dns_query_reply,
si_dns_qps_trend


Splunk added special field
psrsvd_nc_LATENCYContains the numerical count information for the LATENCY fieldsi_dns_response_latency_trend

Splunk added special field
psrsvd_nc_QCOUNTContains the numerical count information for the QCOUNT fieldsi_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend


Splunk added special field
psrsvd_nx_QCOUNTHere, nx = maximum numerical value. Contains the maximum numerical value information for the QCOUNT field.si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day


Splunk added special field
psrsvd_sm_COUNTHere, sm = sum. Contains the sum information for the COUNT field.si_dns_query_reply,
si_dns_qps_trend


Splunk added special field
psrsvd_sm_LATENCYContains the sum information for the LATENCY field.si_dns_response_latency_trend

Splunk added special field
psrsvd_sm_QCOUNTContains the sum information for the QCOUNT fieldsi_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend


Splunk added special field
psrsvd_sx_QCOUNTHere, sx = maximum lexicographical value.
Contains the maximum lexicographical value information for the QCOUNT field
si_dns_member_qps_trend_per_hour, si_dns_member_qps_trend_per_day

Splunk added special field
psrsvd_vHere, v = versio. This is not scoped to a single field.si_dns_query_reply,
si_dns_response_latency_trend,
si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend,
si_dns_qps_trend


Splunk added special field
psrsvd_vt_COUNTHere, vt = value type. Contains precision of the associated field.
This field contains precision of the COUNT field.
si_dns_query_reply,
si_dns_qps_trend


Splunk added special field
psrsvd_vt_LATENCYContains precision of the LATENCY fieldsi_dns_response_latency_trend

Splunk added special field
psrsvd_vt_QCOUNTContains precision of the QCOUNT fieldsi_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend


Splunk added special field
reportContains the name of the report that populates the summary index




DNS Scavenge Object Count Trend datasi_dns_reclaimed_object_count_trend



DNS Top Clients report datasi_dns_top_clients



DNS Replies Trend datasi_dns_query_reply



DNS Top SERVFAIL Errors Received Report datasi_top_servfail_received_queries



DNS Response Latency Trend datasi_dns_response_latency_trend



DNS Daily Peak Hour Query Rate by Member Report datasi_dns_member_qps_trend_per_hour



DNS Top NXDOMAIN / NOERROR (no data) Report datasi_top_nxdomain_query



DNS Daily Query Rate by Member Report datasi_dns_member_qps_trend_per_day



DNS Query Rate by Member Report datasi_dns_member_qps_trend



DNS Top Requested Domain Names Report datasi_dns_requested_domain



DNS Queries Per Second Trend datasi_dns_qps_trend



DNS Top SERVFAIL Errors Sent Report datasi_top_servfail_sent_queries



DDNS Update Rate Trend datasi_ddns_update



DNS Cache Hit Rate Trend datasi_dns_cache_hit_ratio



DNS Top Timed-Out Recursive Queries Report datasi_top_timeout_queries



DNS RPZ Hits Reports datasi_dns_rpz_hits



DNS Top Clients per Domain Report datasi_top_clients_per_domain


search_nameCommon summary index fields



search_nowCommon summary index fields



sourceSplunk Default field



sourcetypeSplunk Default field



splunk_serverSplunk Default field



splunk_server_groupSplunk Default field



timeendposCommon extracted fields



timestartposCommon extracted fields



...