Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

Splunk default fields

Splunk server adds the following default fields to each event in every index.

Field Name

Description

Values/Range

Anchor
date_hour
date_hour
date_hour

Indicates the hour when an event occurred. To narrow your search for specific event timestamps, you can use the default datetime fields. Click here for more information on datetime fields.

Range: 0-23

Anchor
date_mday
date_mday
date_mday

Indicates the day of the month when the event occurred

Range: 1-31

Anchor
date_minute
date_minute
date_minute

Indicates the exact minute when the event occurred

Range: 0-59

Anchor
date_month
date_month
date_month

Indicates the month during which an event occurred


Anchor
date_second
date_second
date_second

Indicates the second in which an event occurred

Range: 0-59

Anchor
date_wday
date_wday
date_wday

Indicates the day of the week in which an event occurred

Example: Sunday, Monday, etc.

Anchor
date_year
date_year
date_year

Indicates the year in which an event occurred


Anchor
date_zone
date_zone
date_zone

Indicates the time for the local timezone of an event, expressed as hours in Unix Time


Anchor
eventtype
eventtype
eventtype

Indicates events of the same type based on a given search. Click here for more information

Example: splunkd-log

Anchor
host
host
host

Contains information about the originating hostname or a network IP address that generates the event

Example: reporting-1.com

Anchor
index
index
index

Contains the name of the index with which a given event is indexed

Example: ib_dns_summary

Anchor
linecount
linecount
linecount

Contains information about the number of lines in an event before it is indexed

Example: 1

Anchor
punct
punct
punct

Contains information about the pattern of the first thirty punctuation characters in the first line of the event with which it is associated. It shows how an event looks when all letters, numbers, and spaces are removed and contains characters such as periods, colons, parentheses, quotes, question marks, dashes, and underscores. Click here for more information.

Wiki Markup
Example: -_::._\[\]:___.../_=

Anchor
source
source
source

Contains the name of the file, stream, or other input details from which the event originates

Example: si-search-dns-query-reply

Anchor
sourcetype
sourcetype
sourcetype

Specifies the format of data input from which the event originates

Stash

Anchor
splunk_server
splunk_server
splunk_server

Contains the name of the Splunk server that comprises the event

Example: reporting-2.com-2-slave

Anchor
splunk_server_group
splunk_server_group
splunk_server_group

Contains the name of the Splunk server group

String


Anchor
_Commonly_extracted_fields
_Commonly_extracted_fields
Commonly extracted fields


Field Name

Description

Values/Range

Source of Data

Anchor
EA
EA
EA

Specifies the extensible attribute

String

__grouping_by_ea_tag_lookup lookup
from /storage/splunk/etc/apps/infoblox
/lookups/grouping_by_ea_tag_map.csv with
host value as input
OR
pool_ea_lookup_csv lookup from
/storage/splunk/etc/apps/infoblox/
lookups/idns_pools.csv with pool value
as input
OR
resource_pool_ea_lookup_csv lookup
from /storage/splunk/etc/apps/infoblox
/lookups/idns_resources.csv with
RESOURCE value as input
OR
network_ea_lookup_csv lookup
from /storage/splunk/etc/apps
/infoblox/lookups/network.csv
with NETWORK value as input

Anchor
HWTYPE
HWTYPE
HWTYPE

Specifies the hardware type

Example: IB-4030

nios_member_hw_lookup lookup from
/storage/splunk/etc/apps/infoblox/
lookups/nios_member_hw.csv with
host value as input

Anchor
MAX_DB_OBJECTS
MAX_DB_OBJECTS
MAX_DB_OBJECTS

Specifies the maximum objects in the database for a host

eg: 8000000nios_member_hw_lookup lookup from
/storage/splunk/etc/apps/infoblox/
lookups/nios_member_hw.csv with
host value as input

Anchor
MAX_DHCP_LPS
MAX_DHCP_LPS
MAX_DHCP_LPS

Specifies the maximum number of DHCP leases per second for a host

Example: 15.0

nios_member_hw_lookup lookup from
/storage/splunk/etc/apps/infoblox/
lookups/nios_member_hw.csv with
host value as input

Anchor
MAX_DNS_QPS
MAX_DNS_QPS
MAX_DNS_QPS

Specifies the maximum DNS queries per second for a host

Example: 1000000.0

nios_member_hw_lookup lookup from
/storage/splunk/etc/apps/infoblox/
lookups/nios_member_hw.csv with
host value as input

Anchor
Member_IP
Member_IP
MEMBER_IP

Specifies the IP address of the member

IP address

nios_member_hw_lookup lookup from
/storage/splunk/etc/apps/infoblox/
lookups/nios_member_ip.csv with
host value as input

Anchor
timeendpos
timeendpos
timeendpos

Specifies the byte at which the timestamp ends. These values are based on the TIME_FORMAT that is specified for a sourcetype under props.conf.

Example: 26


Anchor
timestartpos
timestartpos
timestartpos

Specifies the byte at which the timestamp starts

Example: 0


...

Extracted Field NameDescription of the fieldReportsValues/RangeSource of DataRemarks
CLIENTSpecifies the IP address of the DNS client
Example: 10.39.18.60

COUNTSpecifies the count of DNS queriessi_dns_top_clientsInteger


Specifies the count of SERVFAIL errors that are received for DNS clientssi_top_servfail_received_queriesInteger


Specifies the count of NXDOMAIN/NOERROR replies for DNS clientssi_top_nxdomain_queryInteger


Specifies the count of DNS domain name requestssi_dns_requested_domainInteger


Specifies the count of DNS queries per secondsi_dns_qps_trendInteger


Specifies the count of DNS SERVFAIL errors that are sent for DNS queriessi_top_servfail_sent_queriesInteger


Specifies the count of DNS timed-out recursive queriessi_top_timeout_queriesInteger


Specifies the average count of DNS RPX hitssi_dns_rpz_hitsInteger


Specifies the count of DNS clients per domainsi_top_clients_per_domainInteger

EACommon Extracted fields



FQDNSpecifies the fully qualified domain namesi_dns_requested_domain and
si_top_clients_per_domain
Example: 213.31.102.10.in-addr.arpa

HWTYPECommon Extracted fields



MAX_DB_OBJECTSCommon Extracted fields



MAX_DHCP_LPSCommon Extracted fields



MAX_DNS_QPSCommon Extracted fields



MEMBERSpecifies the member
StringInfoblox DNS Summary
MEMBER_IPCommon Extracted fields



TLDSpecifies top level domain namessi_dns_requested_domainExample: arpa

TYPESpecifies the DNS response typesi_dns_query_reply,
si_dns_qps_trend, and
si_ddns_update
SUCCESS/NOERROR OR
REFERRAL OR
NXRRSET OR
NXDOMAIN OR
REFUSED OR
OTHER


VIEWIt refers to the DNS view key to map DNS view through lookup. See display_name field.si_dns_requested_domain,
si_dns_top_clients,
si_dns_member_qps_trend_per_hour, si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend,
si_dns_qps_trend,
si_ddns_update,
si_dns_cache_hit_ratio,
si_dns_rpz_hits,
si_top_clients_per_domain,
si_top_timeout_queries,
si_top_servfail_sent_queries,
si_top_nxdomain_query, and
si_top_servfail_received_queries
Example: _default

date_hourSplunk Default field



date_mdaySplunk Default field



date_minuteSplunk Default field



date_monthSplunk Default field



date_secondSplunk Default field



date_wdaySplunk Default field



date_yearSplunk Default field



date_zoneSplunk Default field



display_nameSpecifies the DNS viewsi_dns_requested_domain,
si_dns_top_clients,
si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend,
si_dns_qps_trend,
si_ddns_update,
si_dns_cache_hit_ratio,
si_dns_rpz_hits,
si_top_clients_per_domain,
si_top_timeout_queries,
si_top_servfail_sent_queries,
si_top_nxdomain_query, and
si_top_servfail_received_queries
Example: default.MS-2016

Lookup from dns_viewkey_displayname.csv
using the VIEW field value

eventtypeSplunk Default field



hostSplunk Default field



indexSplunk Default field



info_max_timeCommon summary index fields



info_min_timeCommon summary index fields



info_search_timeCommon summary index fields



linecountSplunk Default field



orig_hostSpecifies the host name of the data source
Example: infoblox.com
Splunk added default field
psrsvd_ct_COUNTHere, ct = count. It contains the count information for the COUNT field.si_dns_query_reply and si_dns_qps_trend

Splunk added special field
psrsvd_ct_LATENCYContains the count information for the LATENCY fieldsi_dns_response_latency_trend

Splunk added special field
psrsvd_ct_QCOUNTContains the count information for the QCOUNT field

si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
and si_dns_member_qps_trend



Splunk added special field
psrsvd_gcHere, gc = group count. It indicates the count for stats grouping and it is not scoped to a single field.

si_dns_query_reply,
si_dns_response_latency_trend,
si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend, and
si_dns_qps_trend



Splunk added special field
psrsvd_nc_COUNTHere, nc = numerical count. It indicates the number of numerical values and contains the numerical count information for the COUNT field.si_dns_query_reply and
si_dns_qps_trend


Splunk added special field
psrsvd_nc_LATENCYContains the numerical count information for the LATENCY fieldsi_dns_response_latency_trend

Splunk added special field
psrsvd_nc_QCOUNTContains the numerical count information for the QCOUNT field

si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
and si_dns_member_qps_trend



Splunk added special field
psrsvd_nx_QCOUNTHere, nx = maximum numerical value. It contains the maximum numerical value information for the QCOUNT field.

si_dns_member_qps_trend_per_hour and
si_dns_member_qps_trend_per_day



Splunk added special field
psrsvd_sm_COUNTHere, sm = sum. It contains the sum information for the COUNT field.

si_dns_query_reply and
si_dns_qps_trend



Splunk added special field
psrsvd_sm_LATENCYContains the sum information for the LATENCY field.si_dns_response_latency_trend

Splunk added special field
psrsvd_sm_QCOUNTContains the sum information for the QCOUNT field

si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
and si_dns_member_qps_trend



Splunk added special field
psrsvd_sx_QCOUNTHere, sx = maximum lexicographical value.
It contains the maximum lexicographical value information for the QCOUNT field

si_dns_member_qps_trend_per_hour
and si_dns_member_qps_trend_per_day



Splunk added special field
psrsvd_vHere, v = version. This is not scoped to a single field.

si_dns_query_reply,
si_dns_response_latency_trend,
si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend, and
si_dns_qps_trend



Splunk added special field
psrsvd_vt_COUNTHere, vt = value type. It contains precision of the associated field.
This field contains precision of the COUNT field.
si_dns_query_reply and
si_dns_qps_trend


Splunk added special field
psrsvd_vt_LATENCYContains precision of the LATENCY fieldsi_dns_response_latency_trend

Splunk added special field
psrsvd_vt_QCOUNTContains precision of the QCOUNT field

si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
and si_dns_member_qps_trend



Splunk added special field
reportContains the name of the report that populates the summary index




DNS Scavenge Object Count Trend datasi_dns_reclaimed_object_count_trend



DNS Top Clients report datasi_dns_top_clients



DNS Replies Trend datasi_dns_query_reply



DNS Top SERVFAIL Errors Received Report datasi_top_servfail_received_queries



DNS Response Latency Trend datasi_dns_response_latency_trend



DNS Daily Peak Hour Query Rate by Member Report datasi_dns_member_qps_trend_per_hour



DNS Top NXDOMAIN / NOERROR (no data) Report datasi_top_nxdomain_query



DNS Daily Query Rate by Member Report datasi_dns_member_qps_trend_per_day



DNS Query Rate by Member Report datasi_dns_member_qps_trend



DNS Top Requested Domain Names Report datasi_dns_requested_domain



DNS Queries Per Second Trend datasi_dns_qps_trend



DNS Top SERVFAIL Errors Sent Report datasi_top_servfail_sent_queries



DDNS Update Rate Trend datasi_ddns_update



DNS Cache Hit Rate Trend datasi_dns_cache_hit_ratio



DNS Top Timed-Out Recursive Queries Report datasi_top_timeout_queries



DNS RPZ Hits Reports datasi_dns_rpz_hits



DNS Top Clients per Domain Report datasi_top_clients_per_domain


search_nameCommon summary index fields



search_nowCommon summary index fields



sourceSplunk Default field



sourcetypeSplunk Default field



splunk_serverSplunk Default field



splunk_server_groupSplunk Default field



timeendposCommon extracted fields



timestartposCommon extracted fields



Infoblox DHCP Summary

Extracted Field NameDescription of the fieldReportsValues/RangeSource of DataRemarks
ACTIONSpecifies the action
String. Example: IssuedInfoblox DHCP summary
DEVICE_CLASSSpecifies the device class
String. Example: Linux

fingerprint_device_class_lookup
lookup from /storage/splunk/etc
/apps/infoblox/lookups/fingerprint
_device_class_map.csv with FP value
as input
OR
os_number_fingerprint_lookup lookup
from /storage/splunk/etc/apps/infoblox
/lookups/os_number_fingerprint_device_
class_map.csv with OS_NUMBER value
as input


DHCP_RANGESpecifies the DHCP range
Network range. Example: 10.0.0.1-10.0.0.200

Evaluated from the start_address
and end_address field values


EACommon Extracted fields



FPSpecifies the fingerprint data
String. Example: No MatchInfoblox DHCP summary
HWTYPECommon Extracted fields



LEASED_IPSpecifies the lease IP address
IP addressInfoblox DHCP summary
MAC_DUIDSpecifies the MAC address
MAC addressInfoblox DHCP summary
MAX_DB_OBJECTSCommon Extracted fields



MAX_DHCP_LPSCommon Extracted fields



MAX_DNS_QPSCommon Extracted fields



MEMBER_IPCommon Extracted fields



ProtocolSpecifies the DHCP protocol
String. Example: IPV4Infoblox DHCP summary
SFPSpecifies the SFP
String. Example: Ubuntu/Debian 5/Knoppix 6

os_number_fingerprint_lookup lookup
from /storage/splunk/etc/apps/infoblox/
lookups/os_number_fingerprint_device_
class_map.csv
with OS_NUMBER value as input


VIEWIt refers to the DNS view key to map the DNS view through lookup. See display_name field
String

date_hourSplunk Default field



date_mdaySplunk Default field



date_minuteSplunk Default field



date_monthSplunk Default field



date_secondSplunk Default field



date_wdaySplunk Default field



date_yearSplunk Default field



date_zoneSplunk Default field



dhcp_utilization_statusSpecifies the DHCP utilization status
StringInfoblox DHCP summary
display_nameSpecifies the DNS view
String

DNS view lookup from
dns_viewkey_displayname.csv
using the View field value


end_addressSpecifies the end IP address
IP addressInfoblox DHCP summary
eventtypeSplunk Default field



hostSplunk Default field



indexSplunk Default field



info_max_timeCommon summary index fields



info_min_timeCommon summary index fields



info_search_timeCommon summary index fields



linecountSplunk Default field



membersSpecifies the DHCP member
String. Example: infoblox.localdomainInfoblox DHCP summary
ms_serversSpecifies the MS servers
IP addressInfoblox DHCP summary
orig_hostSpecifies the host name of the data source
Example: infoblox.com
Splunk added default field

psrsvd_ct_FREE_
ADDRESSES

Specifies the count information for FREE_ADDRESSES fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_ct_dhcp_utilizationSpecifies the count for dhcp_utilization field

si_dhcp_range_utilization
_trend



Splunk added special field
psrsvd_ct_dynamic_hostsSpecifies the count for dynamic_hosts fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_ct_static_hostsSpecifies the count for static_hosts fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_ct_v4ackSpecifies the count for v4ack fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v4declineSpecifies the count for v4decline fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v4discoverSpecifies the count for v4discover fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v4informSpecifies the count for v4inform fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v4leaseactiveSpecifies the count for v4leaseactive fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v4leasequerySpecifies the count for v4leasequery fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v4leaseunassignedSpecifies the count for v4leaseunassigned fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v4leaseunknownSpecifies the count for v4leaseunknown fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v4nakSpecifies the count for
v4nak field
si-search-dhcp-message

Splunk added special field
psrsvd_ct_v4offerSpecifies the count for v4offer fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v4releaseSpecifies the count for v4release fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v4requestSpecifies the count for v4request fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6advertiseSpecifies the count for v6advertise fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6confirmSpecifies the count for v6confirm fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6declineSpecifies the count for v6decline fieldsi-search-dhcp-message

Splunk added special field

psrsvd_ct_v6information_
request

Specifies the count for v6information_request fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6leasequerySpecifies the count for v6leasequery fieldsi-search-dhcp-message

Splunk added special field

psrsvd_ct_v6leasequery_
reply

Specifies the count for v6leasequery_reply fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6rebindSpecifies the count for v6rebind fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6reconfigureSpecifies the count for v6reconfigure fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6relay_forwardSpecifies the count for v6relay_forward fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6relay_replySpecifies the count for v6relay_reply fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6releaseSpecifies the count for v6release fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6renewSpecifies the count for v6renew fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6replySpecifies the count for v6reply fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6requestSpecifies the count for v6request fieldsi-search-dhcp-message

Splunk added special field
psrsvd_ct_v6solicitSpecifies the count for v6solicit fieldsi-search-dhcp-message

Splunk added special field
psrsvd_gcHere, gc = group count. The count for stats grouping and not scoped to a single field.




Splunk added special field

psrsvd_nc_FREE_
ADDRESSES

Specifies the numerical count for FREE_ADDRESSES fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_nc_dhcp_utilizationSpecifies the numerical count for dhcp_utilization fieldsi_dhcp_range_utilization_trend

Splunk added special field
psrsvd_nc_dynamic_hostsSpecifies the numerical count for dynamic_hosts fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_nc_static_hostsSpecifies the numerical count for static_hosts fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_nc_v4ackSpecifies the numerical count for v4ack fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v4declineSpecifies the numerical count for v4decline fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v4discoverSpecifies the numerical count for v4discover fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v4informSpecifies the numerical count for v4inform fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v4leaseactiveSpecifies the numerical count for v4leaseactive fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v4leasequerySpecifies the numerical count for v4leasequery fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v4leaseunassignedSpecifies the numerical count for v4leaseunassigned fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v4leaseunknownSpecifies the numerical count for v4leaseunknown fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v4nakSpecifies the numerical count for v4nak fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v4offerSpecifies the numerical count for v4offer fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v4releaseSpecifies the numerical count for
'
v4release
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v4requestSpecifies the numerical count for
'
v4request
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6advertiseSpecifies the numerical count for v6advertise
''
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6confirmSpecifies the numerical count for
'
v6confirm
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6declineSpecifies the numerical count for
'
v6decline
'
fieldsi-search-dhcp-message

Splunk added special field

psrsvd_nc_v6information_
request

Specifies the numerical count for
'
v6information_request
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6leasequerySpecifies the numerical count for
'
v6leasequery
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6leasequery_replySpecifies the numerical count for
'
v6leasequery_reply
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6rebindSpecifies the numerical count for
'
v6rebind
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6reconfigureSpecifies the numerical count for
'
v6reconfigure
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6relay_forwardSpecifies the numerical count for
'
v6relay_forward
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6relay_replySpecifies the numerical count for
'
v6relay_reply
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6releaseSpecifies the numerical count for
'
v6release
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6renewSpecifies the numerical count for
'
v6renew
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6replySpecifies the numerical count for
'
v6reply
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6requestSpecifies the numerical count for
'
v6request
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_nc_v6solicitSpecifies the numerical count for
'
v6solicit
'
fieldsi-search-dhcp-message

Splunk added special field

psrsvd_sm_FREE_
ADDRESSES

Specifies the sum for
'
FREE_ADDRESSES
'
fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_sm_dhcp_utilizationSpecifies the sum for dhcp_utilization fieldsi_dhcp_range_utilization_trend

Splunk added special field
psrsvd_sm_dynamic_hostsSpecifies the sum for
'
dynamic_hosts
'
fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_sm_static_hostsSpecifies the sum for
'
static_hosts
'
fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_sm_v4ackSpecifies the sum for
'
v4ack
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v4declineSpecifies the sum for
'
v4decline
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v4discoverSpecifies the sum for
'
v4discover
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v4informSpecifies the sum for
'
v4inform
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v4leaseactiveSpecifies the sum for
'
v4leaseactive
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v4leasequerySpecifies the sum for
'
v4leasequery
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v4leaseunassignedSpecifies the sum for
'
v4leaseunassigned
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v4leaseunknownSpecifies the sum for
'
v4leaseunknown
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v4nakSpecifies the sum for
'
v4nak
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v4offerSpecifies the sum for
'
v4offer
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v4releaseSpecifies the sum for
'
v4release
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v4requestSpecifies the sum for
'
v4request
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6advertiseSpecifies the sum for
'
v6advertise
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6confirmSpecifies the sum for
'
v6confirm
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6declineSpecifies the sum for
'
v6decline
'
fieldsi-search-dhcp-message

Splunk added special field

psrsvd_sm_v6information_
request

Specifies the sum for
'
v6information_request
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6leasequerySpecifies the sum for
'
v6leasequery
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6leasequery_replySpecifies the sum for
'
v6leasequery_reply
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6rebindSpecifies the sum for
'
v6rebind
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6reconfigureSpecifies the sum for
'
v6reconfigure
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6relay_forwardSpecifies the sum for
'
v6relay_forward
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6relay_replySpecifies the sum for
'
v6relay_reply
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6releaseSpecifies
the
th sum for
'
v6release
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6renewSpecifies the sum for
'
v6renew
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6replySpecifies the sum for
'
v6reply
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6requestSpecifies the sum for
'
v6request
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_sm_v6solicitSpecifies the sum for
'
v6solicit
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vHere, v = version. This is not scoped to a single field.

si_dhcp_usage_trend,
si_dhcp_top_lease_client,
si_dhcp_range_utilization_trend,
si_dhcp_top_os_by_network, and
si-search-dhcp-message



Splunk added special field
psrsvd_vt_FREE_ADDRESSESContains precision of the
'
FREE_ADDRESSES
'
fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_vt_dhcp_utilizationContains precision of the dhcp_utilization fieldsi_dhcp_range_utilization_trend

Splunk added special field
psrsvd_vt_dynamic_hostsContains precision of the
'
dynamic_hosts
'
fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_vt_static_hostsContains precision of the
'
static_hosts
'
fieldsi_dhcp_usage_trend

Splunk added special field
psrsvd_vt_v4ackContains precision of the
'
v4ack
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v4declineContains precision of the
'
v4decline
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v4discoverContains precision of the
'
v4discover
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v4informContains precision of the
'
v4inform
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v4leaseactiveContains precision of the
'
v4leaseactive
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v4leasequeryContains precision of the
'
v4leasequery
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v4leaseunassignedContains precision of the
'
v4leaseunassigned
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v4leaseunknownContains precision of the
'
v4leaseunkown
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v4nakContains precision of the
'
v4nak
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v4offerContains precision of the
'
v4offer
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v4releaseContains precision of the
'
v4release
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v4requestContains precision of the
'
v4request
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6advertiseContains precision of the
'
v6advertise
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6confirmContains precision of the
'
v6confirm
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6declineContains precision of the
'
v6decline
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6information_requestContains precision of the
'
v6information_request
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6leasequeryContains precision of the
'
v6leasequery
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6leasequery_replyContains precision of the
'
v6leasequery_reply
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6rebindContains precision of the
'
v6rebind
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6reconfigureContains precision of the
'
v6reconfigure
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6relay_forwardContains precision of the
'
v6relay_forward
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6relay_replyContains precision of the
'
v6relay_reply
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6releaseContains precision of the
'
v6release
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6renewContains precision of the
'
v6renew
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6replyContains precision of the
'
v6reply
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6requestContains precision of the
'
v6request
'
fieldsi-search-dhcp-message

Splunk added special field
psrsvd_vt_v6solicitContains precision of the
'
v6solicit
'
fieldsi-search-dhcp-message

Splunk added special field
reportName of the report that is populating the summary index




DHCP Message Rate Trend datasi-search-dhcp-message



DHCPv4 Usage Trend datasi_dhcp_usage_trend



DHCP Top Lease Clients report datasi_dhcp_top_lease_client



Top Devices Denied an IP Address report datasi_devices_denied_an_ip_address



DHCPv4 Range Utilization Trendsi_dhcp_range_utilization_trend



Device and Device Classes reports datasi_dhcp_top_os_by_network


search_nameCommon summary index fields



search_nowCommon summary index fields



sourceSplunk Default field



sourcetypeSplunk Default field



splunk_serverSplunk Default field



splunk_server_groupSplunk Default field



start_addressSpecifies the start IP address
IP addressInfoblox DHCP summary
timeendposCommon extracted fields



timestartposCommon extracted fields



ViewSpecifies the network view
String. Example: defaultInfoblox DHCP summary

Infoblox DTC Summary

Extracted Field NameDescription of the fieldReportsValues/RangeSource of DataRemarks
EACommon Extracted fields



HWTYPECommon Extracted fields



MAX_DB_OBJECTSCommon Extracted fields



MAX_DHCP_LPSCommon Extracted fields



MAX_DNS_QPSCommon Extracted fields



MEMBER_IPCommon Extracted fields



date_hourSplunk Default field



date_mdaySplunk Default field



date_minuteSplunk Default field



date_monthSplunk Default field



date_secondSplunk Default field



date_wdaySplunk Default field



date_yearSplunk Default field



date_zoneSplunk Default field



eventtypeSplunk Default field



hostSplunk Default field



indexSplunk Default field



info_max_timeCommon summary index fields



info_min_timeCommon summary index fields



info_search_timeCommon summary index fields



linecountSplunk Default field



MonitorSpecifies the monitor
String. Example: httpsInfoblox DTC summary
orig_hostSpecifies the host name of the data source
Example: infoblox.com
Splunk added default field
poolSpecifies the Pool
String. Example: PoolInfoblox DTC summary
psrsvd_ct_availableSpecifies the count information for available field

si_adns_resource_pool_availability
and
si_smart_dns_resource_availability



Splunk added special field
psrsvd_ct_response_countSpecifies the count information for 'responceresponse_count ' fieldsi_dtc_response_distribution

Splunk added special field
psrsvd_ct_unavailableSpecifies the count information for ' unavailable ' field

si_adns_resource_pool_availability
and
si_smart_dns_resource_availability



Splunk added special field
psrscd_ct_valueSpecifies the count information for ' value ' fieldsi_smart_dns_resource_snmp

Splunk added special field
psrsvd_gcHere, gc = group count. This is the count for stats grouping and it is not scoped to a single field.

si_dtc_response_distribution,
si_smart_dns_resource_snmp,
si_adns_resource_pool_availability,
and
si_smart_dns_resource_availability



Splunk added special field
psrsvd_nc_availableSpecifies the numerical count information for ' available ' field

si_adns_resource_pool_availability
and
si_smart_dns_resource_availability



Splunk added special field
psrsvd_nc_response_countSpecifies the numerical count information for ' response_count ' fieldsi_dtc_response_distribution

Splunk added special field
psrsvd_nc_unavailableSpecifies the numerical count information for ' unavailable ' field

si_adns_resource_pool_availability
and
si_smart_dns_resource_availability



Splunk added special field
psrsvd_nc_valueSpecifies the numerical count information for ' value ' fieldsi_smart_dns_resource_snmp

Splunk added special field
psrsvd_sm_availableSpecifies the sum information for ' available ' field

si_adns_resource_pool_availability
and
si_smart_dns_resource_availability



Splunk added special field
psrsvd_sm_response_countSpecifies the sum information for ' response_count ' fieldsi_dtc_response_distribution

Splunk added special field
psrsvd_sm_unavailableSpecifies the sum information for ' unavailable ' field

si_adns_resource_pool_availability and
si_smart_dns_resource_availability



Splunk added special field
psrsvd_sm_valueSpecifies the sum information for ' value ' fieldsi_smart_dns_resource_snmp

Splunk added special field
psrsvd_vHere, v = version. This is not scoped to a single field.

si_dtc_response_distribution,
si_smart_dns_resource_snmp,
si_adns_resource_pool_availability, and
si_smart_dns_resource_availability



Splunk added special field
psrsvd_vt_availableContains precision of the ' available ' field

si_adns_resource_pool_availability and
si_smart_dns_resource_availability



Splunk added special field
psrsvd_vt_response_count
Contains precision of the response_count field
si_dtc_response_distribution

Splunk added special field
psrsvd_vt_unavailableContains precision of the unavailable field

si_adns_resource_pool_availability and
si_smart_dns_resource_availability



Splunk added special field
psrsvd_vt_valueContains precision of the value fieldsi_smart_dns_resource_snmp

Splunk added special field
reportName of the report that populates the summary index




DNS Traffic Control Response Distribution Trend datasi_dtc_response_distribution



DNS Traffic Control Resource Pool Availability reports datasi_adns_resource_pool_availability



DNS Traffic Control Resource SNMP reports datasi_smart_dns_resource_snmp



DNS Traffic Control Resource Availability reports datasi_smart_dns_resource_availability


resourceSpecifies the resource
String. Example: ServerInfoblox DTC summary
search_nameCommon summary index fields



search_nowCommon summary index fields



sourceSplunk Default field



sourcetypeSplunk Default field



splunk_serverSplunk Default field



splunk_server_groupSplunk Default field



timeendposCommon extracted fields



timestartposCommon extracted fields



...

Extracted Field NameDescription of the fieldReportsValues/RangeSource of DataRemarks
EACommon Extracted fields



HWTYPECommon Extracted fields



MAX_DB_OBJECTSCommon Extracted fields



MAX_DHCP_LPSCommon Extracted fields



MAX_DNS_QPSCommon Extracted fields



MEMBERSpecifies the member
String. Example: infoblox.localdomain: inboundEvaluated from host and sys_report_id field values
MEMBER_IPCommon Extracted fields



date_hourSplunk Default field



date_mdaySplunk Default field



date_minuteSplunk Default field



date_monthSplunk Default field



date_secondSplunk Default field



date_wdaySplunk Default field



date_yearSplunk Default field



date_zoneSplunk Default field



eventtypeSplunk Default field



hostSplunk Default field



indexSplunk Default field



info_max_timeCommon summary index fields



info_min_timeCommon summary index fields



info_search_timeCommon summary index fields



linecountSplunk Default field



orig_hostSpecifies the host name of the data source
Example: infoblox.com
Splunk added default field
psrsvd_ct_CPU_PERCENTSpecifies the count information for the CPU_PERCENT fieldsi_cpu_usage

Splunk added special field
psrsvd_ct_MEMORY_PERCENTSpecifies the count information for the MEMORY_PERCENT fieldsi_memory_utilization

Splunk added special field
psrsvd_ct_TRAF_VALUESpecifies the count information for TRAF_VALUE fieldsi_traffic_rate

Splunk added special field
psrsvd_gcHere, gc = group count. This is the count for a stats " grouping ," and it is not scoped to a single field.

si_memory_utilization,
si_traffic_rate, and
si_cpu_usage



Splunk added special field
psrsvd_nc_CPU_PERCENTSpecifies the numerical count information for CPU_PERCENT fieldsi_cpu_usage

Splunk added special field
psrsvd_nc_MEMORY_PERCENTSpecifies the numerical count information for MEMORY_PERCENT fieldsi_memory_utilization

Splunk added special field
psrsvd_nc_TRAF_VALUESpecifies the numerical count information for TRAF_VALUE fieldsi_traffic_rate

Splunk added special field
psrsvd_sm_CPU_PERCENTSpecifies the sum for CPU_PERCENT fieldsi_cpu_usage

Splunk added special field
psrsvd_sm_MEMORY_PERCENTSpecifies the sum for MEMORY_PERCENT fieldsi_memory_utilization

Splunk added special field
psrsvd_sm_TRAF_VALUESpecifies the sum for TRAF_VALUE fieldsi_traffic_rate

Splunk added special field
psrsvd_vHere, v = version. This is not scoped to a single field.

si_memory_utilization,
si_traffic_rate, and
si_cpu_usage



Splunk added special field
psrsvd_vt_CPU_PERCENTContains precision of the CPU_PERCENT fieldsi_cpu_usage

Splunk added special field
psrsvd_vt_MEMORY_PERCENTContains precision of the MEMORY_PERCENT fieldsi_memory_utilization

Splunk added special field
psrsvd_vt_TRAF_VALUEContains precision of the TRAF_VALUE fieldsi_traffic_rate

Splunk added special field
reportSpecifies the name of the report that is populating the summary index




Index Disk Usage Report Datasi_index_disk_usage



Memory Utilization Trend datasi_memory_utilization



Traffic Rate by Member report datasi_traffic_rate



CPU Utilization Trend datasi_cpu_usage


search_nameCommon summary index fields



search_nowCommon summary index fields



sourceSplunk Default field



sourcetypeSplunk Default field



splunk_serverSplunk Default field



splunk_server_groupSplunk Default field



timeendposCommon extracted fields



timestartposCommon extracted fields



...