Document toolboxDocument toolbox

Reporting Data Model

This section contains information about fields that are included in the reports and dashboards. You can find the commonly extracted fields and their specifications such as data source and range, which can help you better define your dashboards and searches.

Splunk default fields

Splunk server adds the following default fields to each event in every index.

Field Name

Description

Values/Range

date_hour

Indicates the hour when an event occurred. To narrow your search for specific event timestamps, you can use the default datetime fields. Click here for more information on datetime fields.

Range: 0-23

date_mday

Indicates the day of the month when the event occurred

Range: 1-31

date_minute

Indicates the exact minute when the event occurred

Range: 0-59

date_month

Indicates the month during which an event occurred



date_second

Indicates the second in which an event occurred

Range: 0-59

date_wday

Indicates the day of the week in which an event occurred

Example: Sunday, Monday, etc.

date_year

Indicates the year in which an event occurred



date_zone

Indicates the time for the local timezone of an event, expressed as hours in Unix Time



eventtype

Indicates events of the same type based on a given search. Click here for more information.

Example: splunkd-log

host

Contains information about the originating hostname or a network IP address that generates the event

Example: reporting-1.com

index

Contains the name of the index with which a given event is indexed

Example: ib_dns_summary

linecount

Contains information about the number of lines in an event before it is indexed

Example: 1

punct

Contains information about the pattern of the first thirty punctuation characters in the first line of the event with which it is associated. It shows how an event looks when all letters, numbers, and spaces are removed and contains characters such as periods, colons, parentheses, quotes, question marks, dashes, and underscores. Click here for more information.

Example: -_::._\[\]:___.../_=















source

Contains the name of the file, stream, or other input details from which the event originates

Example: si-search-dns-query-reply

sourcetype

Specifies the format of data input from which the event originates

Stash

splunk_server

Contains the name of the Splunk server that comprises the event

Example: reporting-2.com-2-<secondary server>

splunk_server_group

Contains the name of the Splunk server group

String



Commonly Extracted Fields



Field Name

Description

Values/Range

EA

Specifies the extensible attribute

String

HWTYPE

Specifies the hardware type

Example: IB-4015

MAX_DB_OBJECTS

Specifies the maximum objects in the database for a host

eg: 8000000

MAX_DHCP_LPS

Specifies the maximum number of DHCP leases per second for a host

Example: 15.0

MAX_DNS_QPS

Specifies the maximum DNS queries per second for a host

Example: 1000000.0

MEMBER_IP

Specifies the IP address of the member

IP address

timeendpos

Specifies the byte at which the timestamp ends. These values are based on the TIME_FORMAT that is specified for a sourcetype.

Example: 26

timestartpos

Specifies the byte at which the timestamp starts

Example: 0

Indexes and Extracted Data

Infoblox Audit Logs

Most of the fields in this index are extracted directly from the audit.log file. Some of them are mentioned in the table below:

Extracted Field Name

Description of the field

Values/Range

Source of Data

ACTION

Indicates the action taken

String. Example: Called

Infoblox audit logs

ADMIN

Indicates the name of the admin

String. Example: root

Infoblox audit logs

EA

Common Extracted Fields





EXEC_STATUS

Indicates the execution status

String. Example: Pending Approval

Infoblox audit logs

HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





MESSAGE

Indicates the message

String. Example: to=Serial
040Console apparently_via=Direct auth=Local group=.admin-group

Infoblox audit logs

OBJECT_NAME

Indicates the object name

String. Example: RequestRestartServiceStatus

Infoblox audit logs

OBJECT_TYPE

Indicates the object type

String. Example: Shared AAAA Record

Infoblox audit logs

TIMESTAMP

Indicates the timestamp

Timestamp. Example: 2017-01-31 01:57:05

Infoblox audit logs

action

Indicates the action

Example: update, insert

Infoblox audit logs

address



Example: 10.0.0.0

Infoblox audit logs

auth



Example: Local

Infoblox audit logs

cidr



Example: 8

Infoblox audit logs

code



Example: created

Infoblox audit logs

comment



String

Infoblox audit logs

date_hour

Splunk Default field





date_mday

Splunk Default field. 





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





eventtype

Splunk Default field





group



Example: admin-group

Infoblox audit logs

host

Splunk Default field





index

Splunk Default field





linecount

Splunk Default field





member



Example: Member:infoblox.localdomain

Infoblox audit logs

network_view



Example: default

Infoblox audit logs

punct

Splunk Default field





source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





user



Example: admin

Infoblox audit logs

Response_Time



Example: 0.1659

Infoblox audit logs

URI



Example:

v2.10/record:host

Infoblox audit logs

InData



Example: {'comment': 'this is my one.xyz comment', 'name': 'user.zone.com', 'ipv4addrs': [{'configure_for_dhcp': False, 'mac': 'aa:0:0:0:1:cc', 'ipv4addr': '1.1.1.0'}], 'view': 'default'}

Infoblox audit logs

Infoblox DNS Query, DNS Performance, DDNS, DNS Record Scavenging

Extracted Field Name

Description of the field

Values/Range

Source of Data

CLIENT

Indicates the DNS client

String

Infoblox DNS query

COUNT

Indicates the count

Integer

Infoblox DNS query and DNS Record Scavenging

EA

Common Extracted Fields





FQDN

Indicates the FQDN

String

Infoblox DNS query

HITS

Indicates the DNS cache hits count

Integer

Infoblox DNS query

HNAME

Indicates the HNAME

String

Infoblox DNS query

HWTYPE

Common Extracted Fields





LATENCY

Indicates the latency count

Integer

Infoblox DNS performance

MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER

Specifies the member

String

DNS Record Scavenging

MEMBER_IP

Common Extracted fields





MISSES

Specifies DNS cache miss count

Integer

Infoblox DNS query

QCOUNT

Specifies query count

Integer

Infoblox DNS query

REST

REST

String

Infoblox DDNS

SOURCE

SOURCE

String

Infoblox DDNS

SOURCEA

SOURCEA

IP address

Infoblox DDNS

TLD

Specifies the top-level domain name

String

Infoblox DNS query

TYPE

RR Type

String. Example: nxdomain

Infoblox DNS query and DNS Record Scavenging

TYPEA

TYPEA

String. Example: Success

Infoblox DDNS

VIEW



String

Infoblox DNS query

ZONE

Indicates the name of the zone

String

Infoblox DDNS

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





display_name

Specifies the name of the DNS view

String

.

eventtype

Splunk Default field





failure

Specifies the DNS FAILURE query count

Integer



host

Splunk Default field





index

Splunk Default field





linecount

Splunk Default field





nxdomain

Specifies the DNS NXDOMAIN query count

Integer



nxrrset

Specifies the DNS NXRRSET query count

Integer



other

Specifies the DNS other query count

Integer



punct

Splunk Default field





referral

Specifies the DNS REFERRAL query count

Integer



source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





success

Specifies the DNS success query count





timeendpos

Common Extracted Fields





timestartpos

Common Extracted Fields





Infoblox DNS Query Capture

Extracted Field Name

Description of the field

Values/Range

Source of Data

EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





answer_count

Specifies the answer count

Integer

Infoblox DNS query capture

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





display_name

Specifies the DNS view

String



eventtype

Splunk Default field





flag_aa

Flag AA

Boolean. Example: Y

Infoblox DNS query capture

flag_ad

Flag AD

Boolean. Example: Y

Infoblox DNS query capture

flag_edns

Flag EDNS

Boolean. Example: Y

Infoblox DNS query capture

flag_recursion

Flag Recursion

Boolean. Example: Y

Infoblox DNS query capture

host

Splunk Default field





host_class

Specifies the host class

Example: IN

Infoblox DNS query capture

host_type

Specifies the host type

Example: PTR

Infoblox DNS query capture

index

Splunk Default field





linecount

Splunk Default field





message_type

Specifies the message type

Example: Query or Response

Infoblox DNS query capture

name

Specifies the name

Host name. Example: 1.0.0.127.in-addr.arpa

Infoblox DNS query capture

query

Specifies the query

Host name. Example: 213.31.102.10.in-addr.arpa

Infoblox DNS query capture

query_class

Specifies the query class

Example: IN

Infoblox DNS query capture

query_count

Specifies the query count

Integer. Example: 1

Infoblox DNS query capture

query_source

Specifies the query source

Example: I, E

Infoblox DNS query capture

query_type

Specifies the DNS query type

Example: PTR

Infoblox DNS query capture

rdata

RDATA

String. This value depends on the query type.

Infoblox DNS query capture

reply_code

Specifies the reply code

String. Example: ServFail, NoError

Infoblox DNS query capture

source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





src_ip

Specifies the source IP

IP Address

Infoblox DNS query capture

src_port

Specifies the source port

Integer

Infoblox DNS query capture

time_msec

Specifies time in milliseconds

Integer

Infoblox DNS query capture

timeendpos

Common Extracted Fields





timestamp

Indicates the timestamp

Integer

Infoblox DNS query capture

timestartpos

Common Extracted Fields





transport

Specifies the mode of transport

Example: UDP, TCP

Infoblox DNS query capture

ttl

Specifies the TTL

Integer. Example: 3600

Infoblox DNS query capture

view

Specifies the view

Example: 1, 2

Infoblox DNS query capture

Infoblox DHCP Performance

Extracted Field Name

Description of the field

Values/Range

Source of Data

EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





NETWORK

Specifies the network address

Example: 10.0.0.0/8



address

Specifies the DHCP client address

IP address

Infoblox DHCP performance

address_total

Specifies the total number of addresses

Integer

Infoblox DHCP performance

cidr

Specifies the CIDR

Example: 24

Infoblox DHCP performance

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





dhcp_hosts

Specifies the DHCP hosts count

Integer

Infoblox DHCP performance

dhcp_utilization

Specifies the DHCP utilization

Integer

Infoblox DHCP performance

dhcp_utilization_status

Specifies the DHCP utilization status

String

Infoblox DHCP performance



dhcpv4ack

Specifies the DHCPv4 ACK message count

Integer

Infoblox DHCP performance

dhcpv4decline

Specifies the DHCPv4 decline message count

Integer

Infoblox DHCP performance

dhcpv4discover

Specifies the DHCPv4 discover message count

Integer

Infoblox DHCP performance

dhcpv4inform

Specifies the DHCPv4 inform message count

Integer

Infoblox DHCP performance

dhcpv4leaseactive

Specifies the DHCPv4 lease active message count

Integer

Infoblox DHCP performance

dhcpv4leasequery

Specifies the DHCPv4 lease query message count

Integer

Infoblox DHCP performance

dhcpv4leaseunassigned

Specifies the DHCPv4 lease unassigned message count

Integer

Infoblox DHCP performance

dhcpv4leaseunknown

Specifies the DHCPv4 lease unknown message count

Integer

Infoblox DHCP performance

dhcpv4nak

Specifies the DHCPv4 NAK message count

Integer

Infoblox DHCP performance

dhcpv4offer

Specifies the DHCPv4 offer message count

Integer

Infoblox DHCP performance

dhcpv4release

Specifies the DHCPv4 release message count

Integer

Infoblox DHCP performance

dhcpv4request

Specifies the DHCPv4 request message count

Integer

Infoblox DHCP performance

dhcpv6advertise

Specifies the DHCPv6 advertise message count

Integer

Infoblox DHCP performance

dhcpv6confirm

Specifies the DHCPv6 confirm message count

Integer

Infoblox DHCP performance

dhcpv6decline

Specifies the DHCPv6 decline message count

Integer

Infoblox DHCP performance

dhcpv6information_request

Specifies the DHCPv6 information request message count

Integer

Infoblox DHCP performance

dhcpv6leasequery

Specifies the DHCPv6 lease query message count

Integer

Infoblox DHCP performance

dhcpv6leasequery_reply

Specifies the DHCPv6 lease query reply message count

Integer

Infoblox DHCP performance

dhcpv6rebind

Specifies the DHCPv6 rebind message count

Integer

Infoblox DHCP performance

dhcpv6reconfigure

Specifies the DHCPv6 reconfigure message count

Integer

Infoblox DHCP performance

dhcpv6relay_forward

Specifies the DHCPv6 relay forward message count

Integer

Infoblox DHCP performance

dhcpv6relay_reply

Specifies the DHCPv6 relay reply message count

Integer

Infoblox DHCP performance

dhcpv6release

Specifies the DHCPv6 release message count

Integer

Infoblox DHCP performance

dhcpv6renew

Specifies the DHCPv6 renew message count

Integer

Infoblox DHCP performance

dhcpv6reply

Specifies the DHCPv6 reply message count

Integer

Infoblox DHCP performance

dhcpv6request

Specifies the DHCPv6 request message count

Integer

Infoblox DHCP performance

dhcpv6solicit

Specifies the DHCPv6 solicit message count

Integer

Infoblox DHCP performance

display_name

Specifies the DNS View

String



dynamic_hosts

Specifies the dynamic hosts count

Integer

Infoblox DHCP performance

end_address

Specifies the end IP address

IP address

Infoblox DHCP performance

eventtype

Splunk Default field





host

Splunk Default field





index

Splunk Default field





linecount

Splunk Default field





members

Specifies the DHCP member

Example: infoblox.localdomain

Infoblox DHCP performance

ms_servers

Specifies the MS servers

IP address

Infoblox DHCP performance

protocol

Specifies the DHCP protocol

Example: IPV4



punct

Splunk Default field





ranges

Specifies the DHCP ranges count

Integer

Infoblox DHCP performance

source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





start_address

Specifies the start IP address

IP address

Infoblox DHCP performance

static_hosts

Specifies the static hosts count

Integer

Infoblox DHCP performance

timeendpos

Common Extracted Fields





timestamp

Specifies the timestamp of the event

Example: 2017-02-04 03:45:53

Infoblox DHCP performance

timestartpos

Common Extracted Fields





View

Specifies the network view

Example: default

Infoblox DHCP performance

Infoblox DHCP FingerPrint, DHCP Lease History

Extracted Field Name

Description of the field

Values/Range

Source of Data

ACTION

Specifies the action

String. Example: Issued

Infoblox DHCP lease history

CIDR

Specifies the CIDR

Integer

Infoblox DHCP lease history

DEVICE_CLASS

Specifies the device class

String. Example: Linux



EA

Common Extracted Fields





END_EPOCH

Specifies the end epoch time

Integer

Infoblox DHCP lease history

FP

Specifies the name of the DHCP fingerprint

String. Example: No Match

Infoblox DHCP lease history

FP_CIDR

Specifies the fingerprint CIDR

Integer. Example: 8

Infoblox DHCP lease history

FP_NW

Specifies the fingerprint network

Network address. Example: 10.0.0.0

Infoblox DHCP lease history

FP_RANGE

Specifies the fingerprint range

Network range. Example: 10.0.0.1-10.0.0.200

Infoblox DHCP lease history

FP_VIEW

Specifies the fingerprint view

String. Example: default

Infoblox DHCP lease history

HWTYPE

Common Extracted fields





LEASE_IP

Specifies the lease IP address

IP address

Infoblox DHCP lease history

MAC_DUID

Specifies the MAC address

MAC address

Infoblox DHCP lease history

MAX_DB_OBJECTS

Common Extracted fields





MAX_DHCP_LPS

Common Extracted fields





MAX_DNS_QPS

Common Extracted fields





MEMBER_IP

Common Extracted fields





MS Server

Specifies the MS server

IP Address

Infoblox DHCP lease history

NW

Specifies the network

Network address. Example: 10.0.0.0

Infoblox DHCP lease history

OPTION12HOST

Specifies the host name that is sent using DHCP Option 12

String. Example: Fedora21

Infoblox DHCP lease history

OS_NUMBER

Specifies the OS number

Integer

Infoblox DHCP lease history

PROTO

Specifies the protocol

String. Example: dhcpd

Infoblox DHCP lease history

SFP

SFP

String. Example: Ubuntu/Debian 5/Knoppix 6

Infoblox DHCP fingerprint

START_EPOCH

Specifies the start epoch time

Integer

Infoblox DHCP lease history

VIEW

Specifies the view



Infoblox DHCP lease history

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





display_name

Specifies the DNS view

String



eventtype

Splunk Default field





host

Splunk Default field





index

Splunk Default field





linecount

Splunk Default field





punct

Splunk Default field





source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





timeendpos

Common extracted fields





timestartpos

Common extracted fields





Infoblox DDI Utilization

Extracted Field
Name

Description of the field

Values/Range

Source of Data

EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





address_alloc

Specifies the address allocation count

Integer

Infoblox DDI utilization

address_assignable

Specifies the address assignable count

Integer

Infoblox DDI utilization

address_assigned

Specifies the address assigned count

Integer

Infoblox DDI utilization

address_conflicts

Specifies the address conflicts count



Infoblox DDI utilization

address_reserved

Specifies the address reserved count

Integer

Infoblox DDI utilization

address_total

Specifies the total number of addresses

Integer

Infoblox DDI utilization

address_unalloc

Specifies the address unallocation count

Integer

Infoblox DDI utilization

address_unmanaged

Specifies the address unmanaged count

Integer

Infoblox DDI utilization

allocation

Allocation

Integer

Infoblox DDI utilization

cidr

Specifies the CIDR

Example: 24

Infoblox DDI utilization

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





discovered_name

Specifies the discovered name

String

Infoblox DDI utilization

display_name

Specifies the DNS view

String



eventtype

Splunk Default field





first_discovered_timestamp

Specifies the first discovered timestamp

Timestamp

Infoblox DDI utilization

host

Splunk Default field





hosts

Specifies the address hosts count

Integer

Infoblox DDI utilization

index

Splunk Default field





ip_address

Specifies the IP address

IP Address

Infoblox DDI utilization

last_discovered_timestamp

Specifies the last discovered timestamp

timestamp

Infoblox DDI utilization

linecount

Splunk Default field





managed

Indicates if managed or not

Boolean

Infoblox DDI utilization

management_platform

Specifies the management platform

String

Infoblox DDI utilization

members

Specifies the DHCP members

Example: infoblox.localdomain

Infoblox DDI utilization

ms_primary

Specifies the MS primary

String

Infoblox DDI utilization

port_vlan_name

Specifies the VLAN port name

String

Infoblox DDI utilization

port_vlan_number

Specifies the VLAN port number

Integer

Infoblox DDI utilization

network_view

Specifies the network view

String

Infoblox DDI utilization

primary

Primary

FQDN

Infoblox DDI utilization

protocol

Specifies the DHCP protocol

Example: IPV4

Infoblox DDI utilization

punct

Splunk Default field





rr_a

Specifies the resource record A count

Integer

Infoblox DDI utilization

rr_aaaa

Specifies the resource record AAAA count

Integer

Infoblox DDI utilization

rr_cname

Specifies the resource record CNAME count

Integer

Infoblox DDI utilization

rr_dhcid

Specifies the resource record DHCID count

Integer

Infoblox DDI utilization

rr_dname

Specifies the resource record DNAME count

Integer

Infoblox DDI utilization

rr_dnskey

Specifies the resource record DNSKEY count

Integer

Infoblox DDI utilization

rr_ds

Specifies the resource record DS count

Integer

Infoblox DDI utilization

rr_lbdn

Specifies the resource record LBDN count

Integer

Infoblox DDI utilization

rr_mx

Specifies the resource record MX count

Integer

Infoblox DDI utilization

rr_naptr

Specifies the resource record NAPTR count

Integer

Infoblox DDI utilization

rr_ns

Specifies the resource record NS count

Integer

Infoblox DDI utilization

rr_nsec

Specifies the resource record NSEC count

Integer

Infoblox DDI utilization

rr_nsec3

Specifies the resource record NSEC3 count

Integer

Infoblox DDI utilization

rr_nsec3param

Specifies the resource record NSEC3PARAM count

Integer

Infoblox DDI utilization

rr_other

Specifies the resource record OTHER count

Integer

Infoblox DDI utilization

rr_ptr

Specifies the resource record PTR count

Integer

Infoblox DDI utilization

rr_rrsig

Specifies the resource record RRSIG count

Integer

Infoblox DDI utilization

rr_soa

Specifies the resource record SOA count

Integer

Infoblox DDI utilization

rr_srv

Specifies the resource record SRV count

Integer

Infoblox DDI utilization

rr_tlsa

Specifies the resource record TLSA count

Integer

Infoblox DDI utilization

rr_total

Specifies the resource record TOTAL count

Integer

Infoblox DDI utilization

rr_txt

Specifies the resource record TXT count

Integer

Infoblox DDI utilization

signed

Indicates whether signed or not

Boolean

Infoblox DDI utilization

source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





timeendpos

Common Extracted Fields





Timestamp

Specifies the timestamp of the event

Example: 2017-02-04 03:45:53

Infoblox DDI utilization

timestartpos

Common Extracted Fields





utilization

Specifies the address utilization count

Integer

Infoblox DDI utilization

view

Specifies the network view

Example: default

Infoblox DDI utilization

zone_format

Specifies the zone format

String. Example: Forward-Mapping

Infoblox DDI utilization

zone_name

Specifies the zone name

String. Example: member1.com

Infoblox DDI utilization

zones_forward

Specifies the zone forward count

Integer

Infoblox DDI utilization

zones_ipv4

Specifies the IPv4 count of the zone

Integer

Infoblox DDI utilization

zones_ipv6

Specifies the IPv6 count of the zone

Integer

Infoblox DDI utilization

zones_signed

Specifies the signed count of the zone

Integer

Infoblox DDI utilization

Infoblox Discovered Devices Related Dashboards/Reports

Extracted Field Name

Description of the field

Values/Range

Source of Data

ADM_DN_OP_DN_COUNT

Admin-Down/Operation-DownPort Count

Integer

Infoblox discovered devices related
dashboards/reports

ADM_UP_OP_DN_COUNT

Admin-Up/Operation-UpPort Count

Integer

Infoblox discovered devices related
dashboards/reports

ADM_UP_OP_UP_COUNT

Admin-Up/Operation-DownPort Count

Integer

Infoblox discovered devices related
dashboards/reports

COMPONENT_NAME

Specifies the component name

String. Example: DELL-PC8024F

Infoblox discovered devices related
dashboards/reports

COMPONENT_TYPE

Specifies the component type

String. Example: Switch-Router

Infoblox discovered devices related
dashboards/reports

COMPONENT_PORT

Specifies the component port

String. Example: Gi1/0/24

Infoblox discovered devices related
dashboards/reports

DEVICE_MGMT_IP

Specifies the device management IP address

IP address

Infoblox discovered devices related
dashboards/reports

DEVICE_MODEL

Specifies the device model

String. Example: EX2200

Infoblox discovered devices related
dashboards/reports

DEVICE_NAME

Specifies the device name

String. Example: Cisco_434f44

Infoblox discovered devices related
dashboards/reports

DEVICE_TYPE

Specifies the device type

String. Example: Switch, Router

Infoblox discovered devices related
dashboards/reports

DEVICE_VENDOR

Specifies the device vendor

String. Example: Avaya

Infoblox discovered devices related
dashboards/reports

DISCOVERED_MAC_DUID

Specifies the discovered MAC DUID

MAC address

Infoblox discovered devices related
dashboards/reports


DISCOVERED_NAME

Specifies the discoverd name

Example: dev_view1.yahoo.com

Infoblox discovered devices related
dashboards/reports

EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





IN_USE_FLAG

In use flag

Integer. Example: 1

Infoblox discovered devices related
dashboards/reports

IPADDR

Specifies the IP address

IP Address. Example: 11.11.11.11

Infoblox discovered devices related
dashboards/reports

IPADDR_MASK

Specifies the IP address mask

Integer. Example: 128

Infoblox discovered devices related
dashboards/reports

MAC_DUID

Specifies the MAC address

MAC address

Infoblox discovered devices related
dashboards/reports

MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





NETWORK_VIEW

Specifies the network view

String. Example: default

Infoblox discovered devices related
dashboards/reports

NON_NULL_NAME

Specifies the non-null name

String. Example: DELL-PC8024F



NON_NULL_PORT

Specifies the non-null port

String. Example: Gi1/0/24



TIMESTAMP

Specifies the timestamp

Timestamp. Example: 2017-02-15 15:56:27

Infoblox discovered devices related
dashboards/reports

TIMESTAMP_USER_HOST_

PROCESS_PID_INFO_PREFIX

Specifies the timestamp userhost process pid info prefix

String. Example: 2017-02-15T11:02:53+00:00 user infoblox.localdomain
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e5d51f7e-f354-4235-870a-9e02f49b3d41"><ac:plain-text-body><![CDATA[python[]: info ipaddr-activity-rpt

Infoblox discovered devices related
dashboards/reports

TOTAL_AVAIL_COUNT

Specifies the total available count

Integer

Infoblox discovered devices related
dashboards/reports

Type

Specifies the type

String. Example: Discovery



ap_bss_mac

Access Point BSS MAC

MAC address

Infoblox discovered devices related
dashboards/reports

ap_ip_dotted

Access Point IP dotted

String

Infoblox discovered devices related
dashboards/reports

ap_mac

Access Point MAC

MAC address

Infoblox discovered devices related
dashboards/reports

ap_name

Access Point name

String

Infoblox discovered devices related
dashboards/reports

ap_associated_ssid

Access Point associated SSID

String

Infoblox discovered devices related
dashboards/reports

asset_type

Specifies the asset type

String. Example: Physical Device

Infoblox discovered devices related
dashboards/reports

class

Specifies the class name

String. Example: port

Infoblox discovered devices related
dashboards/reports

component_name

Specifies the component name

String. Example: GigabitEthernet1/0/1

Infoblox discovered devices related
dashboards/reports

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





Description

Specifies the description

String. Example: Gigabit Ethernet Port

Infoblox discovered devices related
dashboards/reports

device_id

Specifies the device ID

Integer

Infoblox discovered devices related
dashboards/reports

device_ip_address

Specifies the device IP address

IP address

Infoblox discovered devices related
dashboards/reports

device_model

Specifies the device model

String. Example: catalyst37xxStack

Infoblox discovered devices related
dashboards/reports

device_name

Specifies the device name

String. Example:DELL-PC8024F

Infoblox discovered devices related
dashboards/reports

device_os_version

Specifies the device OS version

String. Example: 4.14.6M

Infoblox discovered devices related
dashboards/reports

device_type

Specifies the device type

String. Example: Switch

Infoblox discovered devices related
dashboards/reports

device_vendor

Specifies the device vendor

String. Example: Cisco

Infoblox discovered devices related
dashboards/reports

device_version

Specifies the device version

String. Example: 5.1.2.3

Infoblox discovered devices related dashboards/reports

display_name

Specifies the DNS view

String

Infoblox discovered devices related dashboards/reports

end_host_addl_info

Specifies additional information about the end host

String

Infoblox discovered devices related dashboards/reports

end_host_device_model

Specifies the device model of the end host

String. Example: catalyst37xxStack

Infoblox discovered devices related dashboards/reports

end_host_device_type

Specifies the device type of the end host

String. Example: Switch-Router

Infoblox discovered devices related dashboards/reports

end_host_device_vendor

Specifies the device vendor of the end host

String. Example: Cisco

Infoblox discovered devices related dashboards/reports

end_host_first_discovered

Specifies the first occasion when the end host was first discovered

Integer

Infoblox discovered devices related dashboards/reports

end_host_ip_address

Specifies the IP address of the end host

IP address

Infoblox discovered devices related dashboards/reports

end_host_last_discovered

Indicates when was end host last discovered

Integer

Infoblox discovered devices related dashboards/reports

end_host_mac_address

Specifies the MAC address of the end host

MAC address

Infoblox discovered devices related dashboards/reports

end_host_name

Specifies the name of the end host

String. Example: WS-C3750X-24P

Infoblox discovered devices related dashboards/reports

end_host_network_view

Specifies the network view of the end host

String. Example: custom view

Infoblox discovered devices related dashboards/reports

end_host_os_version

Specifies the version of the end host OS

String. Example: 15.2(1)E2

Infoblox discovered devices related dashboards/reports

eventtype

Splunk Default field





firmware_rev

Indicates firmware revision

String. Example: 15.2(1)E2

Infoblox discovered devices related dashboards/reports

first_seen

First seen timestamp

Integer

Infoblox discovered devices related dashboards/reports

hardware_rev

Specifies revision of the hardware

String. Example: V05

Infoblox discovered devices related dashboards/reports

host

Splunk Default field





index

Splunk Default field





interface_admin_status

Specifies the interface admin status

String. Example: up

Infoblox discovered devices related dashboards/reports

interface_description

Specifies the interface interface description

String

Infoblox discovered devices related dashboards/reports

interface_ip_address

Specifies the interface IP address

IP address

Infoblox discovered devices related dashboards/reports

interface_name

Specifies the interface name

String. Example: Fa0

Infoblox discovered devices related dashboards/reports

interface_port_status

Specifies the interface port status

String. Example: up

Infoblox discovered devices related dashboards/reports

interface_speed

Specifies the interface speed

Integer. Example: 1000000000

Infoblox discovered devices related dashboards/reports

interface_type

Specifies the interface type

String. Example: tunnel

Infoblox discovered devices related dashboards/reports

interface_vlan

Specifies the interface VLAN ID

Integer Example: 16

Infoblox discovered devices related dashboards/reports

interface_vlan_name

Specifies the interface VLAN name

String. Example: VLAN1014

Infoblox discovered devices related dashboards/reports

ip_address

Specifies the IP address

IP address

Infoblox discovered devices related dashboards/reports

is_trunk_port

Specifies if it is a trunk port or not

Boolean

Infoblox discovered devices related dashboards/reports

last_seen

Specifies the last seen timestamp

Integer

Infoblox discovered devices related dashboards/reports

linecount

Splunk Default field





model

Specifies the model name

String. Example: DCS-7048T-A

Infoblox discovered devices related dashboards/reports

network_view

Specifies the network view

String. Example: custom view

Infoblox discovered devices related dashboards/reports

port_last_changed_at

The timestamp when the port was last changed

Timestamp

Infoblox discovered devices related dashboards/reports

punct

Splunk Default field





serial_number

Specifies the serial number

String. Example: JPE12440180

Infoblox discovered devices related dashboards/reports

software_rev

Specifies the software revision

String. Example: 15.2(1)E2

Infoblox discovered devices related dashboards/reports

source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





switch_interface

Specifies the switch interface

String. Example: Gi0/47

Infoblox discovered devices related dashboards/reports

switch_ip_address

Specifies the switch IP Address

IP Address

Infoblox discovered devices related dashboards/reports

switch_model

Indicates the switch model

String. Example: cat3560x48

Infoblox discovered devices related dashboards/reports

switch_name

Specifies the switch name

String. Example: ni-mri-sw4.inca.infoblox.com

Infoblox discovered devices related dashboards/reports

switch_os_version

Specifies the OS version of the switch

String. Example: 12.2(53)SE2

Infoblox discovered devices related dashboards/reports

switch_type

Specifies the switch type

String. Example: Switch

Infoblox discovered devices related dashboards/reports

switch_vendor

Specifies the vendor of the switch

String. Example: Cisco

Infoblox discovered devices related dashboards/reports

switch_vlan

Specifies the switch VLAN

Integer. Example: 18

Infoblox discovered devices related dashboards/reports

timeendpos

Common Extracted Fields





timestamp

Indicates the timestamp

Integer

Infoblox discovered devices related dashboards/reports

timestamp_user_host_process_pid_info_prefix

Specifies the prefix

String

Infoblox discovered devices related dashboards/reports

timestartpos

Common Extracted Fields





user_id

Specifies the User ID



Infoblox discovered devices related dashboards/reports

View

Specifies the DNS view

String

Infoblox discovered devices related
dashboards/reports

virtual_ind

Specifies the virtual indicator

Integer



Infoblox Threat Protection Related Dashboards/Reports

Extracted Field Name

Description of the field

Values/Range

Source of Data

ACOUNT

ACOUNT

Integer

Infoblox threat protection
related dashboards/reports

ACTIVE_COUNT

Specifies the active count

Integer

Infoblox threat protection
related dashboards/reports

ALERT_ID

Specifies the alert ID

Integer

Infoblox threat protection
related dashboards/reports

ALERT_TYPE

Specifies the alert type

String

Infoblox threat protection
related dashboards/reports

BLOCK_END

Specifies the block end IP address

Integer

Infoblox threat protection
related dashboards/reports

BLOCK_START

Specifies the block start IP address

Integer

Infoblox threat protection
related dashboards/reports

CATEGORY

Specifies the category

String. Example: OSPF

Infoblox threat protection
related dashboards/reports

CLIENT

Specifies the client

String

Infoblox threat protection
related dashboards/reports

COUNT

Specifies the count

Integer

Infoblox threat protection
related dashboards/reports

DCOUNT

Specifies the DCOUNT

Integer

Infoblox threat protection
related dashboards/reports

DNST_CATEGORY

Specifies the destination category

String

Infoblox threat protection
related dashboards/reports

DOMAIN_NAME

Specifies the domain name

String

Infoblox threat protection
related dashboards/reports

EA

Common Extracted Fields





FIREEYE_APPLIANCE

Specifies the FireEye appliance

String

Infoblox threat protection
related dashboards/reports

HWTYPE

Common Extracted Fields





LOG_SEVERITY

Specifies log severity

String

Infoblox threat protection
related dashboards/reports

MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





MESSAGE

Specifies the message

String. Example: DROP OSPF unexpected

Infoblox threat protection
related dashboards/reports

MITIGATION_ACTION

Specifies the mitigation action

String

Infoblox threat protection
related dashboards/reports

NAT_STATUS

Specifies the NAT status

String

Infoblox threat protection
related dashboards/reports

RECORD_DATA

Specifies the record data

String

Infoblox threat protection
related dashboards/reports

RPZ_QNAME

Specifies the RPZ QNAME

String

Infoblox threat protection
related dashboards/reports

RULE_DESCRIPTION

Specifies the rule description

String. Example: This rule drops any unexpected OSPF packets when OSPF is disabled.



RULE_NAME

Specifies the rule name

String. Example: DROP OSPF unexpected



RULE_SID

Specifies the rule SID

Integer

Infoblox threat protection
related dashboards/reports

SEVERITY

Specifies the severity

String. Example: INFORMATIONAL

Infoblox threat protection
related dashboards/reports

SID

Specifies the SID

Integer

Infoblox threat protection
related dashboards/reports

SOURCE_IP

Specifies the source IP

IP address

Infoblox threat protection
related dashboards/reports

SOURCE_PORT

Specifies the source port

Integer

Infoblox threat protection
related dashboards/reports

TIMESTAMP

Indicates the timestamp

Timestamp

Infoblox threat protection
related dashboards/reports

TOTAL_COUNT

Specifies the total count

Integer

Infoblox threat protection
related dashboards/reports

VIEW

Specifies the DNS view

String

Infoblox threat protection
related dashboards/reports

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





eventtype

Splunk Default field





host

Splunk Default field





index

Splunk Default field





linecount

Splunk Default field





punct

Splunk Default field





source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





timestartpos

Common extracted fields





Infoblox DNS Traffic Control

Most of the fields in this index are extracted directly from the syslog_filtered.log file. Some of them are mentioned in the table below:

Extracted Field Name

Description of the field

Values/Range

Source of Data

EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





available

Specifies the available count

Integer

Infoblox DNS traffic control

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





eventtype

Splunk Default field





host

Splunk Default field





index

Splunk Default field





linecount

Splunk Default field





monitor

Specifies the DNS Traffic Control SNMP health monitor

String

Infoblox DNS traffic control

pool

Specifies the pool

String

Infoblox DNS traffic control

punct

Splunk Default field





resource

Specifies the resource

String

Infoblox DNS traffic control

response_count

Specifies the response count

Integer

Infoblox DNS traffic control

source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





timeendpos

Common Extracted Fields





timestamp

Indicates the timestamp of the event

Example: 2017-02-04 03:45:53



timestartpos

Common Extracted Fields





unavailable

Specifies the unavailable count

Integer

Infoblox DNS traffic control

Infoblox Cloud Related Dashboards/Reports

Extracted Field Name

Description of the field

Values/Range

Source of Data

ACTION

Specifies the action

String. Example: Allocated



EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





TENANT_NAME

Specifies the name of the tenant associated with the VM

String



action

Specifies the action count

Integer

Infoblox cloud related dashboards/reports

address

Specifies the IP address

IP address

Infoblox cloud related dashboards/reports

address_type

Specifies the type of address

Integer

Infoblox cloud related dashboards/reports

application_type

Specifies the application type



Infoblox cloud related dashboards/reports

cidr

Specifies the CIDR

Example: 24

Infoblox cloud related dashboards/reports

cnames

Specifies the common name

String

Infoblox cloud related dashboards/reports

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





display_name

Specifies the DNS view

String



elastic_address

Specifies the elastic IP address

IP address

Infoblox cloud related dashboards/reports

eventtype

Splunk Default field





Fqdn

Specifies the FQDN

String

Infoblox cloud related dashboards/reports

host

Splunk Default field





index

Splunk Default field





interface_name

Specifies the interface name

String

Infoblox cloud related dashboards/reports

is_primary_ifc

Indicates if primary IFC or not

Example: 0 (not primary)

Infoblox cloud related dashboards/reports

linecount

Splunk Default field





location

Specifies the location



Infoblox cloud related dashboards/reports

mac_address

Specifies the MAC address

Example: 00:11:22:33:44:55

Infoblox cloud related dashboards/reports

mgmt_platform

Specifies management platform

Example: vm132ctest

Infoblox cloud related dashboards/reports

network

Specifies the network address

Example: 10.0.0.0/8

Infoblox cloud related dashboards/reports

network_view

Specifies the network view

Example: default

Infoblox cloud related dashboards/reports

port_id

Specifies the port ID

Integer

Infoblox cloud related dashboards/reports

private_address

Specifies the private address

IP address

Infoblox cloud related dashboards/reports

private_hostname

Specifies the private hostname

String

Infoblox cloud related dashboards/reports

public_address

Specifies the public address

IP address

Infoblox cloud related dashboards/reports

public_hostname

Specifies the public hostname

String

Infoblox cloud related dashboards/reports

punct

Splunk Default field





source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





tenant_id

Specifies the tenant ID

Integer

Infoblox cloud related dashboards/reports

timeendpos

Common Extracted Fields





timestamp

Indicates the timestamp of the event

Example: 2017-02-04 03:45:53

Infoblox cloud related dashboards/reports

timestartpos

Common Extracted Fields





view

Specifies the DNS view

String



vlan_id

Specifies the VLAN ID

Integer

Infoblox cloud related dashboards/reports

vm_hostname

Specifies the hostname of the VM

String

Infoblox cloud related dashboards/reports

vm_name

Specifies the name of the VM

Example: 99

Infoblox cloud related dashboards/reports

vm_vpc_address

Specifies the VPC address of the VM

IP address

Infoblox cloud related dashboards/reports

vm_vpc_cidr

Specifies the VPC CIDR of the VM

Example: 24

Infoblox cloud related dashboards/reports

vm_vpc_id

Specifies the VPC ID of the VM

Integer

Infoblox cloud related dashboards/reports

vm_vpc_name

Specifies the VPC name of the VM

Integer

Infoblox cloud related dashboards/reports

vpc_addr

Specifies the VPC address

IP address

Infoblox cloud related dashboards/reports

Infoblox Syslog

Most of the fields in this index are extracted directly from the syslog_filtered.log file. Some of them are mentioned in the table below:

Extracted Field Name

Description of the field

Values/Range

Source of Data

BOOT_IMAGE



Example: /boot/bzImage

Infoblox syslog file

CPUs



Integer. Example: 8

Infoblox syslog file

EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





eventtype

Splunk Default field





group



Example: admin-group

Infoblox syslog file

hits



Integer

Infoblox syslog file

host

Splunk Default field





index

Splunk Default field





linecount

Splunk Default field





misses



Integer

Infoblox syslog file

punct

Splunk Default field





size



Integer

Infoblox syslog file

source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





timeendpos

Common Extracted Fields





timestartpos

Common Extracted Fields





System Capacity

Extracted Field Name

Description of the field

Values/Range

Source of Data

COUNT

Specifies the count

Integer

System capacity

EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





PERCENT

Specifies the percentage

Integer

System capacity

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





eventtype

Splunk Default field





host

Splunk Default field





index

Splunk Default field





linecount

Splunk Default field





punct

Splunk Default field





source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





timeendpos

Common Extracted Fields





timestartpos

Common Extracted Fields





Infoblox System Utilization (CPU, Memory, Network Traffic) Related Dashboards/Reports

Extracted Field Name

Description of the field

Values/Range

Source of Data

CPU_PERCENT

Specifies the CPU percentage

Integer value within 0-100

Infoblox system utilization
related dashboards/reports

EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





MEMORY_PERCENT

Specifies the memory percentage

Integer. Value within 0-100

Infoblox system utilization
related dashboards/reports

TRAF_VALUE

Specifies the traffic value

Integer

Infoblox system utilization
related dashboards/reports

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





eventtype

Splunk Default field





host

Splunk Default field





index

Splunk Default field





linecount

Splunk Default field





punct

Splunk Default field





source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





sys_report_id

Specifies the report ID based on whether inbound or outbound

Integer

Infoblox system utilization
related dashboards/reports

timeendpos

Common Extracted Fields





timestartpos

Common Extracted Fields





Infoblox Ecosystem Subscription

Extracted Field Name

Description of the field

Values/Range

Source of Data

EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





cisco_ise_endpoint_profile

Specifies the Cisco ISE endpoint profile

String

Infoblox ecosystem subscription

cisco_ise_security_group

Specifies the Cisco ISE security group



Infoblox ecosystem subscription

cisco_ise_session_state

Specifies the Cisco ISE session state

String. Example: STARTED

Infoblox ecosystem subscription

cisco_ise_ssid

Specifies the Cisco ISE SSID

String

Infoblox ecosystem subscription

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





domainname

Specifies the domain name

String

Infoblox ecosystem subscription

ea_eps_status

Specifies the EPS status of the extensible attribute

String

Infoblox ecosystem subscription

eventtype

Splunk Default field





guid

Specifies the GUID

String

Infoblox ecosystem subscription

host

Splunk Default field





index

Splunk Default field





ip_address

Specifies the IP address

IP address

Infoblox ecosystem subscription

last_discovered_timestamp

Specifies the last discovered timestamp

Integer

Infoblox ecosystem subscription

linecount

Splunk Default field





port_vlan_name

Specifies the VLAN name of the port

String

Infoblox ecosystem subscription

port_vlan_number

Specifies the VLAN number of the port

Integer

Infoblox ecosystem subscription

punct

Splunk Default field





source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





timeendpos

Common Extracted Fields





timestamp

Specifies the timestamp of the event

Example: 2017-02-04 03:45:53

Infoblox ecosystem subscription

timestartpos

Common Extracted Fields





username

Specifies the username

String

Infoblox ecosystem subscription

Infoblox Ecosystem Publication

Extracted Field Name

Description of the field

Values/Range

Source of Data

EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





contents

Specifies the content

String. Example: {'LEASE_STATE': 'STARTED', 'Lease_Start_Time': '2017-03-01T07:00:00Z', 'MAC_OR_DUID': '80:3c:3e:29:84:cc', 'Fingerprint': 'No Match', 'Lease_End_Time': '2017-03-01T07:02:00Z', 'IPAddress': '10.0.0.20', 'Infoblox_Member': '10.35.205.6'}

Infoblox ecosystem publication

date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





eventtype

Splunk Default field





host

Splunk Default field





index

Splunk Default field





ip_address

Specifies the IP address

IP address

Infoblox ecosystem publication

linecount

Splunk Default field





notification_action

Specifies the notification action

Example: CISCOISE_PUBLISH_IPAM

Infoblox ecosystem publication

notification_target

Specifies the notification target

IP address

Infoblox ecosystem publication

punct

Splunk Default field





source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





timeendpos

Common Extracted Fields





timestamp

Specifies the timestamp of the event

Example: 2017-02-04 03:45:53

Infoblox ecosystem publication

timestartpos

Common Extracted Fields





Reporting License Usage

Extracted Field Name

Description of the field

Values/Range

Source of Data

EA

Common Extracted Fields





HWTYPE

Common Extracted Fields





MAX_DB_OBJECTS

Common Extracted Fields





MAX_DHCP_LPS

Common Extracted Fields





MAX_DNS_QPS

Common Extracted Fields





MEMBER_IP

Common Extracted Fields





date_hour

Splunk Default field





date_mday

Splunk Default field





date_minute

Splunk Default field





date_month

Splunk Default field





date_second

Splunk Default field





date_wday

Splunk Default field





date_year

Splunk Default field





date_zone

Splunk Default field





display_name

Specifies the DNS view

String



eventtype

Splunk Default field





host

Splunk Default field





index

Splunk Default field





license_count

Specifies the license count

Integer

Reporting license usage

license_pool

Specifies the license pool

String. Example: cloud_api.0

Reporting license usage

linecount

Splunk Default field





punct

Splunk Default field





source

Splunk Default field





sourcetype

Splunk Default field





splunk_server

Splunk Default field





splunk_server_group

Splunk Default field





timeendpos

Common Extracted Fields





timestamp

Indicates the timestamp

Timestamp

Reporting license usage

timestartpos

Common Extracted Fields





utilization

Specifies the utilization

Integer

Reporting license usage

view

Specifies the DNS view

String



Summary Indexes

Summary Indexes Frequency

The field frequencies of all fields for each summary index are as mentioned below:

Summary Index

Report

Frequency

Cron Schedule

Earliest
Time

Latest
Time

ib_dns_summary

si_dns_reclaimed_object_count_trend

At every 30th minute from 21 through 59

21-59/30 * * * *

30m@m

60m@m



si_dns_top_clients

At every 30th minute from 2 through 59

2-59/30 * * * *

30m@m

60m@m



si_dns_query_reply

At every 30th minute from 18 through 59

18-59/30 * * * *

30m@m

60m@m



si_top_servfail_received_queries

At every 30th minute from 7 through 59

7-59/30 * * * *

30m@m

60m@m



si_dns_response_latency_trend

At every 30th minute from 20 through 59

20-59/30 * * * *

30m@m

60m@m



si_dns_member_qps_trend_per_hour

At minute 34

34 * * * *

@h

-1h@h



si_top_nxdomain_query

At every 30th minute from 5 through 59

5-59/30 * * * *

30m@m

60m@m



si_dns_member_qps_trend_per_day

Every day 32 minutes past midnight

32 0 * * *

@d

-1d@d



si_dns_member_qps_trend

At every 30th minute from 12 through 59

12-59/30 * * * *

30m@m

60m@m



si_dns_requested_domain

At every 30th minute from 4 through 59

4-59/30 * * * *

30m@m

60m@m



si_dns_qps_trend

At every 30th minute from 10 through 59

10-59/30 * * * *

30m@m

60m@m



si_top_servfail_sent_queries

At every 30th minute from 6 through 59

6-59/30 * * * *

30m@m

60m@m



si_ddns_update

At every 30th minute from 6 through 59

6-59/30 * * * *

30m@m

60m@m



si_dns_cache_hit_ratio

At every 30th minute from 8 through 59

8-59/30 * * * *

30m@m

60m@m



si_top_timeout_queries

At every 30th minute from 8 through 59

8-59/30 * * * *

30m@m

60m@m



si_dns_rpz_hits

At every 10th minute from 2 through 59

2-59/10 * * * *

10m@m

20m@m



si_top_clients_per_domain

At every 30th minute from 3 through 59

3-59/30 * * * *

30m@m

60m@m

ib_dhcp_summary

si_dhcp_message

At every 30th minute from 14 through 59

14-59/30 * * * *

30m@m

60m@m



si_dhcp_usage_trend

At 22 minutes past every 8th hour

22 */8 * * *

15m@m

495m@m



si_dhcp_top_lease_client

At every 30th minute from 16 through 59

16-59/30 * * * *

30m@m

60m@m



si_devices_denied_an_ip_address

At every 30th minute from 19 through 59

19-59/30 * * * *

30m@m

60m@m



si_dhcp_range_utilization_trend

At 24 minutes past every 8th hour

24 */8 * * *

15m@m

495m@m



si_dhcp_top_os_by_network

At every 30th minute from 16 through 59

16-59/30 * * * *

30m@m

60m@m

ib_dtc_summary

si_dtc_response_distribution

At 37 minutes past every 6th hour

37 */6 * * *

10m@m

370m@m



si_adns_resource_pool_availability

At 23 minutes past every 6th hour

23 */6 * * *

10m@m

370m@m



si_smart_dns_resource_snmp

At 47 minutes past every 6th hour

47 */6 * * *

10m@m

370m@m



si_smart_dns_resource_availability

At 47 minutes past every 6th hour

47 */6 * * *

10m@m

370m@m

ib_system_summary

si_index_disk_usage

At 37 minutes past every 6th hour

37 */6 * * *

10m@m

370m@m



si_memory_utilization

At every 30th minute from 26 through 59

26-59/30 * * * *

30m@m

60m@m



si_traffic_rate

At every 30th minute from 28 through 59

28-59/30 * * * *

30m@m

60m@m



si_cpu_usage

At every 30th minute

*/30 * * * *

30m@m

60m@m

ib_security_summary

si_dns_tunneling_activity

At every 3030th th minute from 11 through 59

11-59/30 * * * *

30m@m

60m@m

Note:

  • cron schedule - cron time scheduled to execute a search

  • earliest time - specifies the earliest time for a search

  • latest time - specifies the latest time for a saved search

Common fields in summary indexes

Splunk server adds the following fields to every event in each summary index.

Field Name

Description of the field

Values/Range

Remarks

info_max_time

The info_* fields are added to each event when you use the addinfo command. This command is primarily an internally-used component of Summary Indexing. Click here for more information.
The latest time boundary for the search.

Integer

Splunk added special field

info_min_time

Specifies the earliest time boundary for search

Integer

Splunk added special field

info_search_time

Specifies the time when search was initiated

Integer

Splunk added special field

search_name

Specifies the name of the saved search

Example: si-search-dns-query-reply

Splunk added special field

search_now

Specifies the time when search was scheduled to run

Integer

Splunk added special field

Infoblox DNS Summary

Note: *psrsvd* stands for *prestats reserved{*}. Syntax is psrsvd_\[type\]_\[fieldname\]. These special fields are added by Splunk to summary index data that begins with *psrsvd* when you initiate search using the *si** command to populate a summary index. See List of available psrsvd types from Splunk docs.

Extracted Field Name

Description of the field

Reports

Values/Range

Source of Data

Remarks

CLIENT

Specifies the IP address of the DNS client



Example: 10.39.18.60





COUNT

Specifies the count of DNS queries

si_dns_top_clients

Integer







Specifies the count of SERVFAIL errors that are received for DNS clients

si_top_servfail_received_queries

Integer







Specifies the count of NXDOMAIN/NOERROR replies for DNS clients

si_top_nxdomain_query

Integer







Specifies the count of DNS domain name requests

si_dns_requested_domain

Integer







Specifies the count of DNS queries per second

si_dns_qps_trend

Integer







Specifies the count of DNS SERVFAIL errors that are sent for DNS queries

si_top_servfail_sent_queries

Integer







Specifies the count of DNS timed-out recursive queries

si_top_timeout_queries

Integer







Specifies the average count of DNS RPX hits

si_dns_rpz_hits

Integer







Specifies the count of DNS clients per domain

si_top_clients_per_domain

Integer





EA

Common Extracted Fields









FQDN

Specifies the fully qualified domain name

si_dns_requested_domain and
si_top_clients_per_domain

Example: 213.31.102.10.in-addr.arpa





HWTYPE

Common Extracted Fields









MAX_DB_OBJECTS

Common Extracted Fields









MAX_DHCP_LPS

Common Extracted Fields









MAX_DNS_QPS

Common Extracted Fields









MEMBER

Specifies the member



String

Infoblox DNS Summary



MEMBER_IP

Common Extracted Fields









TLD

Specifies top level domain names

si_dns_requested_domain

Example: arpa





TYPE

Specifies the DNS response type

si_dns_query_reply,
si_dns_qps_trend, and
si_ddns_update

SUCCESS/NOERROR OR
REFERRAL OR
NXRRSET OR
NXDOMAIN OR
REFUSED OR
OTHER





VIEW

It refers to the DNS view key to map DNS view through lookup. See display_name field.

si_dns_requested_domain,
si_dns_top_clients,
si_dns_member_qps_trend_per_hour, si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend,
si_dns_qps_trend,
si_ddns_update,
si_dns_cache_hit_ratio,
si_dns_rpz_hits,
si_top_clients_per_domain,
si_top_timeout_queries,
si_top_servfail_sent_queries,
si_top_nxdomain_query, and
si_top_servfail_received_queries

Example: _default





date_hour

Splunk Default field









date_mday

Splunk Default field









date_minute

Splunk Default field









date_month

Splunk Default field









date_second

Splunk Default field









date_wday

Splunk Default field









date_year

Splunk Default field









date_zone

SplunkReporting Data Model









display_name

Specifies the DNS view

si_dns_requested_domain,
si_dns_top_clients,
si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend,
si_dns_qps_trend,
si_ddns_update,
si_dns_cache_hit_ratio,
si_dns_rpz_hits,
si_top_clients_per_domain,
si_top_timeout_queries,
si_top_servfail_sent_queries,
si_top_nxdomain_query, and
si_top_servfail_received_queries

Example: default.MS-2016





eventtype

Splunk Default field









host

Splunk Default field









index

Splunk Default field









info_max_time

Common summary index fields









info_min_time

Common summary index fields









info_search_time

Common summary index fields









linecount

Splunk Default field









orig_host

Specifies the host name of the data source



Example: infoblox.com



Splunk added default field

psrsvd_ct_COUNT

Here, ct = count. It contains the count information for the COUNT field.

si_dns_query_reply and si_dns_qps_trend





Splunk added special field

psrsvd_ct_LATENCY

Contains the count information for the LATENCY field

si_dns_response_latency_trend





Splunk added special field

psrsvd_ct_QCOUNT

Contains the count information for the QCOUNT field

si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
and si_dns_member_qps_trend





Splunk added special field

psrsvd_gc

Here, gc = group count. It indicates the count for stats grouping and it is not scoped to a single field.

si_dns_query_reply,
si_dns_response_latency_trend,
si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend, and
si_dns_qps_trend





Splunk added special field

psrsvd_nc_COUNT

Here, nc = numerical count. It indicates the number of numerical values and contains the numerical count information for the COUNT field.

si_dns_query_reply and
si_dns_qps_trend





Splunk added special field

psrsvd_nc_LATENCY

Contains the numerical count information for the LATENCY field

si_dns_response_latency_trend





Splunk added special field

psrsvd_nc_QCOUNT

Contains the numerical count information for the QCOUNT field

si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
and si_dns_member_qps_trend





Splunk added special field

psrsvd_nx_QCOUNT

Here, nx = maximum numerical value. It contains the maximum numerical value information for the QCOUNT field.

si_dns_member_qps_trend_per_hour and
si_dns_member_qps_trend_per_day





Splunk added special field

psrsvd_sm_COUNT

Here, sm = sum. It contains the sum information for the COUNT field.

si_dns_query_reply and
si_dns_qps_trend





Splunk added special field

psrsvd_sm_LATENCY

Contains the sum information for the LATENCY field.

si_dns_response_latency_trend





Splunk added special field

psrsvd_sm_QCOUNT

Contains the sum information for the QCOUNT field

si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
and si_dns_member_qps_trend





Splunk added special field

psrsvd_sx_QCOUNT

Here, sx = maximum lexicographical value.
It contains the maximum lexicographical value information for the QCOUNT field

si_dns_member_qps_trend_per_hour
and si_dns_member_qps_trend_per_day





Splunk added special field

psrsvd_v

Here, v = version. This is not scoped to a single field.

si_dns_query_reply,
si_dns_response_latency_trend,
si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
si_dns_member_qps_trend, and
si_dns_qps_trend





Splunk added special field

psrsvd_vt_COUNT

Here, vt = value type. It contains precision of the associated field.
This field contains precision of the COUNT field.

si_dns_query_reply and
si_dns_qps_trend





Splunk added special field

psrsvd_vt_LATENCY

Contains precision of the LATENCY field

si_dns_response_latency_trend





Splunk added special field

psrsvd_vt_QCOUNT

Contains precision of the QCOUNT field

si_dns_member_qps_trend_per_hour,
si_dns_member_qps_trend_per_day,
and si_dns_member_qps_trend





Splunk added special field

report

Contains the name of the report that populates the summary index











DNS Scavenge Object Count Trend data

si_dns_reclaimed_object_count_trend









DNS Top Clients report data

si_dns_top_clients









DNS Replies Trend data

si_dns_query_reply









DNS Top SERVFAIL Errors Received Report data

si_top_servfail_received_queries









DNS Response Latency Trend data

si_dns_response_latency_trend









DNS Daily Peak Hour Query Rate by Member Report data

si_dns_member_qps_trend_per_hour









DNS Top NXDOMAIN / NOERROR (no data) Report data

si_top_nxdomain_query









DNS Daily Query Rate by Member Report data

si_dns_member_qps_trend_per_day









DNS Query Rate by Member Report data

si_dns_member_qps_trend









DNS Top Requested Domain Names Report data

si_dns_requested_domain









DNS Queries Per Second Trend data

si_dns_qps_trend









DNS Top SERVFAIL Errors Sent Report data

si_top_servfail_sent_queries









DDNS Update Rate Trend data

si_ddns_update









DNS Cache Hit Rate Trend data

si_dns_cache_hit_ratio









DNS Top Timed-Out Recursive Queries Report data

si_top_timeout_queries









DNS RPZ Hits Reports data

si_dns_rpz_hits









DNS Top Clients per Domain Report data

si_top_clients_per_domain







search_name

Common summary index fields









search_now

Common summary index fields









source

Splunk Default field









sourcetype

Splunk Default field









splunk_server

Splunk Default field









splunk_server_group

Splunk Default field









timeendpos

Common Extracted Fields









timestartpos

Common Extracted Fields









Infoblox DHCP Summary

Extracted Field Name

Description of the field

Reports

Values/Range

Source of Data

Remarks

ACTION

Specifies the action



String. Example: Issued

Infoblox DHCP summary



DEVICE_CLASS

Specifies the device class



String. Example: Linux





DHCP_RANGE

Specifies the DHCP range



Network range. Example: 10.0.0.1-10.0.0.200





EA

Common Extracted fields









FP

Specifies the fingerprint data



String. Example: No Match

Infoblox DHCP summary



HWTYPE

Common Extracted Fields









LEASED_IP

Specifies the lease IP address



IP address

Infoblox DHCP summary



MAC_DUID

Specifies the MAC address



MAC address

Infoblox DHCP summary



MAX_DB_OBJECTS

Common Extracted Fields









MAX_DHCP_LPS

Common Extracted Fields









MAX_DNS_QPS

Common Extracted Fields









MEMBER_IP

Common Extracted Fields









Protocol

Specifies the DHCP protocol



String. Example: IPV4

Infoblox DHCP summary



SFP

Specifies the SFP



String. Example: Ubuntu/Debian 5/Knoppix 6





VIEW

It refers to the DNS view key to map the DNS view through lookup. See display_name field



String





date_hour

Splunk Default field









date_mday

Splunk Default field









date_minute

Splunk Default field









date_month

Splunk Default field









date_second

Splunk Default field









date_wday

Splunk Default field









date_year

Splunk Default field









date_zone

Splunk Default field









dhcp_utilization_status

Specifies the DHCP utilization status



String

Infoblox DHCP summary



display_name

Specifies the DNS view



String





end_address

Specifies the end IP address



IP address

Infoblox DHCP summary



eventtype

Splunk Default field









host

Splunk Default field









index

Splunk Default field









info_max_time

Common summary index fields









info_min_time

Common summary index fields









info_search_time

Common summary index fields









linecount

Splunk Default field









members

Specifies the DHCP member



String. Example: infoblox.localdomain

Infoblox DHCP summary



ms_servers

Specifies the MS servers



IP address

Infoblox DHCP summary



orig_host

Specifies the host name of the data source



Example: infoblox.com



Splunk added default field

psrsvd_ct_FREE_
ADDRESSES

Specifies the count information for FREE_ADDRESSES field

si_dhcp_usage_trend





Splunk added special field

psrsvd_ct_dhcp_utilization

Specifies the count for dhcp_utilization field

si_dhcp_range_utilization
_trend





Splunk added special field

psrsvd_ct_dynamic_hosts

Specifies the count for dynamic_hosts field

si_dhcp_usage_trend





Splunk added special field

psrsvd_ct_static_hosts

Specifies the count for static_hosts field

si_dhcp_usage_trend





Splunk added special field

psrsvd_ct_v4ack

Specifies the count for v4ack field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v4decline

Specifies the count for v4decline field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v4discover

Specifies the count for v4discover field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v4inform

Specifies the count for v4inform field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v4leaseactive

Specifies the count for v4leaseactive field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v4leasequery

Specifies the count for v4leasequery field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v4leaseunassigned

Specifies the count for v4leaseunassigned field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v4leaseunknown

Specifies the count for v4leaseunknown field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v4nak

Specifies the count for
v4nak field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v4offer

Specifies the count for v4offer field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v4release

Specifies the count for v4release field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v4request

Specifies the count for v4request field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6advertise

Specifies the count for v6advertise field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6confirm

Specifies the count for v6confirm field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6decline

Specifies the count for v6decline field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6information_
request

Specifies the count for v6information_request field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6leasequery

Specifies the count for v6leasequery field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6leasequery_
reply

Specifies the count for v6leasequery_reply field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6rebind

Specifies the count for v6rebind field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6reconfigure

Specifies the count for v6reconfigure field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6relay_forward

Specifies the count for v6relay_forward field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6relay_reply

Specifies the count for v6relay_reply field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6release

Specifies the count for v6release field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6renew

Specifies the count for v6renew field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6reply

Specifies the count for v6reply field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6request

Specifies the count for v6request field

si-search-dhcp-message





Splunk added special field

psrsvd_ct_v6solicit

Specifies the count for v6solicit field

si-search-dhcp-message





Splunk added special field

psrsvd_gc

Here, gc = group count. The count for stats grouping and not scoped to a single field.







Splunk added special field

psrsvd_nc_FREE_
ADDRESSES

Specifies the numerical count for FREE_ADDRESSES field

si_dhcp_usage_trend





Splunk added special field

psrsvd_nc_dhcp_utilization

Specifies the numerical count for dhcp_utilization field

si_dhcp_range_utilization_trend





Splunk added special field

psrsvd_nc_dynamic_hosts

Specifies the numerical count for dynamic_hosts field

si_dhcp_usage_trend





Splunk added special field

psrsvd_nc_static_hosts

Specifies the numerical count for static_hosts field

si_dhcp_usage_trend





Splunk added special field

psrsvd_nc_v4ack

Specifies the numerical count for v4ack field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v4decline

Specifies the numerical count for v4decline field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v4discover

Specifies the numerical count for v4discover field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v4inform

Specifies the numerical count for v4inform field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v4leaseactive

Specifies the numerical count for v4leaseactive field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v4leasequery

Specifies the numerical count for v4leasequery field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v4leaseunassigned

Specifies the numerical count for v4leaseunassigned field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v4leaseunknown

Specifies the numerical count for v4leaseunknown field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v4nak

Specifies the numerical count for v4nak field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v4offer

Specifies the numerical count for v4offer field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v4release

Specifies the numerical count for v4release field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v4request

Specifies the numerical count for v4request field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6advertise

Specifies the numerical count for v6advertise field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6confirm

Specifies the numerical count for v6confirm field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6decline

Specifies the numerical count for v6decline field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6information_
request

Specifies the numerical count for v6information_request field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6leasequery

Specifies the numerical count for v6leasequery field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6leasequery_reply

Specifies the numerical count for v6leasequery_reply field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6rebind

Specifies the numerical count for v6rebind field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6reconfigure

Specifies the numerical count for v6reconfigure field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6relay_forward

Specifies the numerical count for v6relay_forward field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6relay_reply

Specifies the numerical count for v6relay_reply field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6release

Specifies the numerical count for v6release field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6renew

Specifies the numerical count for v6renew field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6reply

Specifies the numerical count for v6reply field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6request

Specifies the numerical count for v6request field

si-search-dhcp-message





Splunk added special field

psrsvd_nc_v6solicit

Specifies the numerical count for v6solicit field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_FREE_
ADDRESSES

Specifies the sum for FREE_ADDRESSES field

si_dhcp_usage_trend





Splunk added special field

psrsvd_sm_dhcp_utilization

Specifies the sum for dhcp_utilization field

si_dhcp_range_utilization_trend





Splunk added special field

psrsvd_sm_dynamic_hosts

Specifies the sum for dynamic_hosts field

si_dhcp_usage_trend





Splunk added special field

psrsvd_sm_static_hosts

Specifies the sum for static_hosts field

si_dhcp_usage_trend





Splunk added special field

psrsvd_sm_v4ack

Specifies the sum for v4ack field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v4decline

Specifies the sum for v4decline field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v4discover

Specifies the sum for v4discover field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v4inform

Specifies the sum for v4inform field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v4leaseactive

Specifies the sum for v4leaseactive field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v4leasequery

Specifies the sum for v4leasequery field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v4leaseunassigned

Specifies the sum for v4leaseunassigned field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v4leaseunknown

Specifies the sum for v4leaseunknown field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v4nak

Specifies the sum for v4nak field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v4offer

Specifies the sum for v4offer field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v4release

Specifies the sum for v4release field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v4request

Specifies the sum for v4request field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6advertise

Specifies the sum for v6advertise field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6confirm

Specifies the sum for v6confirm field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6decline

Specifies the sum for v6decline field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6information_
request

Specifies the sum for v6information_request field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6leasequery

Specifies the sum for v6leasequery field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6leasequery_reply

Specifies the sum for v6leasequery_reply field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6rebind

Specifies the sum for v6rebind field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6reconfigure

Specifies the sum for v6reconfigure field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6relay_forward

Specifies the sum for v6relay_forward field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6relay_reply

Specifies the sum for v6relay_reply field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6release

Specifies th sum for v6release field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6renew

Specifies the sum for v6renew field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6reply

Specifies the sum for v6reply field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6request

Specifies the sum for v6request field

si-search-dhcp-message





Splunk added special field

psrsvd_sm_v6solicit

Specifies the sum for v6solicit field

si-search-dhcp-message





Splunk added special field

psrsvd_v

Here, v = version. This is not scoped to a single field.

si_dhcp_usage_trend,
si_dhcp_top_lease_client,
si_dhcp_range_utilization_trend,
si_dhcp_top_os_by_network, and
si-search-dhcp-message





Splunk added special field

psrsvd_vt_FREE_ADDRESSES

Contains precision of the FREE_ADDRESSES field

si_dhcp_usage_trend





Splunk added special field

psrsvd_vt_dhcp_utilization

Contains precision of the dhcp_utilization field

si_dhcp_range_utilization_trend





Splunk added special field

psrsvd_vt_dynamic_hosts

Contains precision of the dynamic_hosts field

si_dhcp_usage_trend





Splunk added special field

psrsvd_vt_static_hosts

Contains precision of the static_hosts field

si_dhcp_usage_trend





Splunk added special field

psrsvd_vt_v4ack

Contains precision of the v4ack field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v4decline

Contains precision of the v4decline field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v4discover

Contains precision of the v4discover field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v4inform

Contains precision of the v4inform field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v4leaseactive

Contains precision of the v4leaseactive field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v4leasequery

Contains precision of the v4leasequery field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v4leaseunassigned

Contains precision of the v4leaseunassigned field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v4leaseunknown

Contains precision of the v4leaseunkown field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v4nak

Contains precision of the v4nak field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v4offer

Contains precision of the v4offer field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v4release

Contains precision of the v4release field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v4request

Contains precision of the v4request field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6advertise

Contains precision of the v6advertise field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6confirm

Contains precision of the v6confirm field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6decline

Contains precision of the v6decline field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6information_request

Contains precision of the v6information_request field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6leasequery

Contains precision of the v6leasequery field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6leasequery_reply

Contains precision of the v6leasequery_reply field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6rebind

Contains precision of the v6rebind field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6reconfigure

Contains precision of the v6reconfigure field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6relay_forward

Contains precision of the v6relay_forward field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6relay_reply

Contains precision of the v6relay_reply field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6release

Contains precision of the v6release field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6renew

Contains precision of the v6renew field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6reply

Contains precision of the v6reply field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6request

Contains precision of the v6request field

si-search-dhcp-message





Splunk added special field

psrsvd_vt_v6solicit

Contains precision of the v6solicit field

si-search-dhcp-message





Splunk added special field

report

Name of the report that is populating the summary index











DHCP Message Rate Trend data

si-search-dhcp-message









DHCPv4 Usage Trend data

si_dhcp_usage_trend









DHCP Top Lease Clients report data

si_dhcp_top_lease_client









Top Devices Denied an IP Address report data

si_devices_denied_an_ip_address









DHCPv4 Range Utilization Trend

si_dhcp_range_utilization_trend









Device and Device Classes reports data

si_dhcp_top_os_by_network







search_name

Common summary index fields









search_now

Common summary index fields









source

Splunk Default field









sourcetype

Splunk Default field









splunk_server

Splunk Default field









splunk_server_group

Splunk Default field









start_address

Specifies the start IP address



IP address

Infoblox DHCP summary



timeendpos

Common Extracted Fields









timestartpos

Common Extracted Fields









View

Specifies the network view



String. Example: default

Infoblox DHCP summary



Infoblox DTC Summary

Extracted Field Name

Description of the field

Reports

Values/Range

Source of Data

Remarks

EA

Common Extracted Fields









HWTYPE

Common Extracted Fields









MAX_DB_OBJECTS

Common Extracted Fields









MAX_DHCP_LPS

Common Extracted Fields









MAX_DNS_QPS

Common Extracted Fields









MEMBER_IP

Common Extracted Fields









date_hour

Splunk Default field









date_mday

Splunk Default field









date_minute

Splunk Default field









date_month

Splunk Default field









date_second

Splunk Default field









date_wday

Splunk Default field









date_year

Splunk Default field









date_zone

Splunk Default field









eventtype

Splunk Default field









host

Splunk Default field









index

Splunk Default field









info_max_time

Common summary index fields









info_min_time

Common summary index fields









info_search_time

Common summary index fields









linecount

Splunk Default field









Monitor

Specifies the monitor



String. Example: https

Infoblox DTC summary



orig_host

Specifies the host name of the data source



Example: infoblox.com



Splunk added default field

pool

Specifies the Pool



String. Example: Pool

Infoblox DTC summary



psrsvd_ct_available

Specifies the count information for available field

si_adns_resource_pool_availability
and
si_smart_dns_resource_availability





Splunk added special field

psrsvd_ct_response_count

Specifies the count information for response_count field

si_dtc_response_distribution





Splunk added special field

psrsvd_ct_unavailable

Specifies the count information for unavailable field

si_adns_resource_pool_availability
and
si_smart_dns_resource_availability





Splunk added special field

psrscd_ct_value

Specifies the count information for value field

si_smart_dns_resource_snmp





Splunk added special field

psrsvd_gc

Here, gc = group count. This is the count for stats grouping and it is not scoped to a single field.

si_dtc_response_distribution,
si_smart_dns_resource_snmp,
si_adns_resource_pool_availability,
and
si_smart_dns_resource_availability





Splunk added special field

psrsvd_nc_available

Specifies the numerical count information for available field

si_adns_resource_pool_availability
and
si_smart_dns_resource_availability





Splunk added special field

psrsvd_nc_response_count

Specifies the numerical count information for response_count field

si_dtc_response_distribution





Splunk added special field

psrsvd_nc_unavailable

Specifies the numerical count information for unavailable field

si_adns_resource_pool_availability
and
si_smart_dns_resource_availability





Splunk added special field

psrsvd_nc_value

Specifies the numerical count information for value field

si_smart_dns_resource_snmp





Splunk added special field

psrsvd_sm_available

Specifies the sum information for available field

si_adns_resource_pool_availability
and
si_smart_dns_resource_availability





Splunk added special field

psrsvd_sm_response_count

Specifies the sum information for response_count field

si_dtc_response_distribution





Splunk added special field

psrsvd_sm_unavailable

Specifies the sum information for unavailable field

si_adns_resource_pool_availability and
si_smart_dns_resource_availability





Splunk added special field

psrsvd_sm_value

Specifies the sum information for value field

si_smart_dns_resource_snmp





Splunk added special field

psrsvd_v

Here, v = version. This is not scoped to a single field.

si_dtc_response_distribution,
si_smart_dns_resource_snmp,
si_adns_resource_pool_availability, and
si_smart_dns_resource_availability





Splunk added special field

psrsvd_vt_available

Contains precision of the available field

si_adns_resource_pool_availability and
si_smart_dns_resource_availability





Splunk added special field

psrsvd_vt_response_count

Contains precision of the response_count field

si_dtc_response_distribution





Splunk added special field

psrsvd_vt_unavailable

Contains precision of the unavailable field

si_adns_resource_pool_availability and
si_smart_dns_resource_availability





Splunk added special field

psrsvd_vt_value

Contains precision of the value field

si_smart_dns_resource_snmp





Splunk added special field

report

Name of the report that populates the summary index











DNS Traffic Control Response Distribution Trend data

si_dtc_response_distribution









DNS Traffic Control Resource Pool Availability reports data

si_adns_resource_pool_availability









DNS Traffic Control Resource SNMP reports data

si_smart_dns_resource_snmp









DNS Traffic Control Resource Availability reports data

si_smart_dns_resource_availability







resource

Specifies the resource



String. Example: Server

Infoblox DTC summary



search_name

Common summary index fields









search_now

Common summary index fields









source

Splunk Default field









sourcetype

Splunk Default field









splunk_server

Splunk Default field









splunk_server_group

Splunk Default field









timeendpos

Common Extracted Fields









timestartpos

Common Extracted Fields









Infoblox System Summary

Extracted Field Name

Description of the field

Reports

Values/Range

Source of Data

Remarks

EA

Common Extracted Fields









HWTYPE

Common Extracted Fields









MAX_DB_OBJECTS

Common Extracted Fields









MAX_DHCP_LPS

Common Extracted Fields









MAX_DNS_QPS

Common Extracted Fields









MEMBER

Specifies the member



String. Example: infoblox.localdomain: inbound





MEMBER_IP

Common Extracted Fields









date_hour

Splunk Default field









date_mday

Splunk Default field









date_minute

Splunk Default field









date_month

Splunk Default field









date_second

Splunk Default field









date_wday

Splunk Default field









date_year

Splunk Default field









date_zone

Splunk Default field









eventtype

Splunk Default field









host

Splunk Default field









index

Splunk Default field









info_max_time

Common summary index fields









info_min_time

Common summary index fields









info_search_time

Common summary index fields









linecount

Splunk Default field









orig_host

Specifies the host name of the data source



Example: infoblox.com



Splunk added default field

psrsvd_ct_CPU_PERCENT

Specifies the count information for the CPU_PERCENT field

si_cpu_usage





Splunk added special field

psrsvd_ct_MEMORY_PERCENT

Specifies the count information for the MEMORY_PERCENT field

si_memory_utilization





Splunk added special field

psrsvd_ct_TRAF_VALUE

Specifies the count information for TRAF_VALUE field

si_traffic_rate





Splunk added special field

psrsvd_gc

Here, gc = group count. This is the count for a stats grouping and it is not scoped to a single field.

si_memory_utilization,
si_traffic_rate, and
si_cpu_usage





Splunk added special field

psrsvd_nc_CPU_PERCENT

Specifies the numerical count information for CPU_PERCENT field

si_cpu_usage





Splunk added special field

psrsvd_nc_MEMORY_PERCENT

Specifies the numerical count information for MEMORY_PERCENT field

si_memory_utilization





Splunk added special field

psrsvd_nc_TRAF_VALUE

Specifies the numerical count information for TRAF_VALUE field

si_traffic_rate





Splunk added special field

psrsvd_sm_CPU_PERCENT

Specifies the sum for CPU_PERCENT field

si_cpu_usage





Splunk added special field

psrsvd_sm_MEMORY_PERCENT

Specifies the sum for MEMORY_PERCENT field

si_memory_utilization





Splunk added special field

psrsvd_sm_TRAF_VALUE

Specifies the sum for TRAF_VALUE field

si_traffic_rate





Splunk added special field

psrsvd_v

Here, v = version. This is not scoped to a single field.

si_memory_utilization,
si_traffic_rate, and
si_cpu_usage





Splunk added special field

psrsvd_vt_CPU_PERCENT

Contains precision of the CPU_PERCENT field

si_cpu_usage





Splunk added special field

psrsvd_vt_MEMORY_PERCENT

Contains precision of the MEMORY_PERCENT field

si_memory_utilization





Splunk added special field

psrsvd_vt_TRAF_VALUE

Contains precision of the TRAF_VALUE field

si_traffic_rate





Splunk added special field

report

Specifies the name of the report that is populating the summary index











Index Disk Usage Report Data

si_index_disk_usage









Memory Utilization Trend data

si_memory_utilization









Traffic Rate by Member report data

si_traffic_rate









CPU Utilization Trend data

si_cpu_usage







search_name

Common summary index fields









search_now

Common summary index fields









source

Splunk Default field









sourcetype

Splunk Default field









splunk_server

Splunk Default field









splunk_server_group

Splunk Default field









timeendpos

Common Extracted Fields









timestartpos

Common Extracted Fields









Infoblox Security Summary

Extracted Field Name

Description of the field

Reports

Values/Range

Source of Data

Remarks

ACTIVE_COUNT

Specifies the active count



Integer

Infoblox security summary



BLOCK_END

Specifies the block end IP address



Integer

Infoblox security summary



BLOCK_START

Specifies the block start IP address



Integer

Infoblox security summary



DNST_CATEGORY

Specifies the destination category



String





EA

Common Extracted Fields









HWTYPE

Common Extracted Fields









MAX_DB_OBJECTS

Common Extracted Fields









MAX_DHCP_LPS

Common Extracted Fields









MAX_DNS_QPS

Common Extracted Fields









MEMBER_IP

Common Extracted Fields









NAT_STATUS

Specifies the NAT status



String

Infoblox security summary



RULE_DESCRIPTION

Specifies the rule description



String. Example: This rule drops unexpected OSPF packets when OSPF is disabled.





RULE_NAME

Specifies the rule name



String. Example: DROP OSPF unexpected





RULE_SID

Specifies the rule SID



Integer

Infoblox security summary



SOURCE_IP

Specifies the source IP



IP address

Infoblox security summary



SOURCE_PORT

Specifies the source port



Integer

Infoblox security summary



date_hour

Splunk Default field









date_mday

Splunk Default field









date_minute

Splunk Default field









date_month

Splunk Default field









date_second

Splunk Default field









date_wday

Splunk Default field









date_year

Splunk Default field









date_zone

Splunk Default field









eventtype

Splunk Default field









host

Splunk Default field









index

Splunk Default field









info_max_time

Common summary index fields









info_min_time

Common summary index fields









info_search_time

Common summary index fields









linecount

Splunk Default field









orig_host

Specifies the host name of the data source



Example: infoblox.com



Splunk added default field

report

Name of the report that is populating the summary index











DNS Tunneling Activity Reports data

si_dns_tunneling_activity







search_name

Common summary index fields









search_now

Common summary index fields









source

Splunk Default field









sourcetype

Splunk Default field









splunk_server

Splunk Default field









splunk_server_group

Splunk Default field









timeendpos

Common Extracted Fields









timestartpos

Common Extracted Fields