Prerequisites

To complete the configuration of Splunk for PingIntelligence, you need to create a source type. Creating a source type helps Splunk to understand the event format.

Create Source type

The source type is one of the default fields that Splunk assigns to all the incoming data. Configuring the source type informs Splunk about the type of data ABS provides. This helps Splunk in formatting data intelligently during indexing.

To create a source type, complete the following steps:

  1. Configure a new source type by navigating to Splunk Enterprise > Settings > Source Types > New Source type. The source type events page is displayed.
  2. Configure the New Source type. The fields are defined in the following table:
    Name Value
    Source type name pi_events_source_type
    Destination app Search and Reporting (Can change for your apps)
    Category Structures
    Indexed Extractions json
    BREAK_ONLY_BEFORE (\{)
    MUST_BREAK_AFTER (\})
    SEDCMD-alter s/pi-attack-info-//
  3. Create a new index pi_events by navigating to EnterpriseSettingsIndexesNew Index.