Skip to content

Commit

Permalink
Rename all uses of splunk_index.csv with splunk_metadata.csv
Browse files Browse the repository at this point in the history
  • Loading branch information
rfaircloth-splunk committed Jun 15, 2020
1 parent aa5ff27 commit b2d9f64
Show file tree
Hide file tree
Showing 23 changed files with 36 additions and 36 deletions.
8 changes: 4 additions & 4 deletions docs/configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ TA in Splunk. The administrator will need to ensure all recommneded indexes be
are not changed.

It is understood that default values will need to be changed in many installations. To accomodate this, each filter consults
a lookup file that is mounted to the container (by default `/opt/sc4s/local/context/splunk_index.csv`) and is populated with
a lookup file that is mounted to the container (by default `/opt/sc4s/local/context/splunk_metadata.csv`) and is populated with
defaults on the first run of SC4S after being set up according to the "getting started" runtime documents. This is a CSV
file containing a "key" that is referenced in the log path for each data source. These keys are documented in the individual
source files in this section, and allow one to override Splunk metadata either in whole or part. The use of this file is best
Expand All @@ -158,7 +158,7 @@ page in this section:
|------------------------|---------------------|----------------|---------------|
| juniper_netscreen | netscreen:firewall | netfw | none |

Here is a snippet from the `splunk_index.csv` file:
Here is a snippet from the `splunk_metadata.csv` file:

```bash
juniper_netscreen,index,ns_index
Expand All @@ -185,7 +185,7 @@ In general, for most deployments the index should be the only change needed; oth
never be overridden (particularly for the "Out of the Box" data sources). Even then, care should be taken when considering any alternates,
as the defaults for SC4S were chosen with best practices in mind.

The `splunk_index.csv` file should also be appended to (with a "commented out" default for the index) when building custom SC4S log paths
The `splunk_metadata.csv` file should also be appended to (with a "commented out" default for the index) when building custom SC4S log paths
(filters). Care should be taken during filter design to choose appropriate index, sourctype and template defaults, so that admins are not
compelled to override them.

Expand All @@ -198,7 +198,7 @@ which maps to an associated lookup of alternate indexes, sources, or other metad
added to futher classify the data.

* The `conf` and `csv` files referenced below will be populated into the `/opt/sc4s/local/context` directory when SC4S is run for the first
time after being set up according to the "getting started" runtime documents, in a similar fashion to `splunk_index.csv`.
time after being set up according to the "getting started" runtime documents, in a similar fashion to `splunk_metadata.csv`.
After this first-time population of the files takes place, they can be edited (and SC4S restarted) for the changes to take effect. To get started:

* Edit the file ``compliance_meta_by_source.conf`` to supply uniquely named filters to identify events subject to override.
Expand Down
4 changes: 2 additions & 2 deletions docs/gettingstarted/docker-swarm-general.md
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ that are not provided out of the box in SC4S. To get you started, there is an e
and a filter (`example.conf`) in the `log_paths` and `filters` subdirectories, respectively. These should _not_ be used directly,
but copied as templates for your own log path development. They _will_ get overwritten at each SC4S start.

* In the `local/context` directory, if you change the "non-example" version of a file (e.g. `splunk_index.csv`) the changes
* In the `local/context` directory, if you change the "non-example" version of a file (e.g. `splunk_metadata.csv`) the changes
will be preserved on a restart.

* Create the subdirectory ``/opt/sc4s/archive``. This will be used as a mount point for local storage of syslog events
Expand Down Expand Up @@ -173,7 +173,7 @@ can be ammended with additional ``target`` stanzas in the ``ports`` section of t
Log paths are preconfigured to utilize a convention of index destinations that are suitable for most customers.

* If changes need to be made to index destinations, navigate to the ``/opt/sc4s/local/context`` directory to start.
* Edit `splunk_index.csv` to review or change the index configuration and revise as required for the data sources utilized in your
* Edit `splunk_metadata.csv` to review or change the index configuration and revise as required for the data sources utilized in your
environment. Simply uncomment the relevant line and enter the desired index. The "Sources" document details the specific entries in
this table that pertain to the individual data source filters that are included with SC4S.
* Other Splunk metadata (e.g. source and sourcetype) can be overriden via this file as well. This is an advanced topic, and further
Expand Down
4 changes: 2 additions & 2 deletions docs/gettingstarted/docker-swarm-rhel7.md
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@ that are not provided out of the box in SC4S. To get you started, there is an e
and a filter (`example.conf`) in the `log_paths` and `filters` subdirectories, respectively. These should _not_ be used directly,
but copied as templates for your own log path development. They _will_ get overwritten at each SC4S start.

* In the `local/context` directory, if you change the "non-example" version of a file (e.g. `splunk_index.csv`) the changes
* In the `local/context` directory, if you change the "non-example" version of a file (e.g. `splunk_metadata.csv`) the changes
will be preserved on a restart.

* Create the subdirectory ``/opt/sc4s/archive``. This will be used as a mount point for local storage of syslog events
Expand Down Expand Up @@ -181,7 +181,7 @@ can be ammended with additional ``target`` stanzas in the ``ports`` section of t
Log paths are preconfigured to utilize a convention of index destinations that are suitable for most customers.

* If changes need to be made to index destinations, navigate to the ``/opt/sc4s/local/context`` directory to start.
* Edit `splunk_index.csv` to review or change the index configuration and revise as required for the data sources utilized in your
* Edit `splunk_metadata.csv` to review or change the index configuration and revise as required for the data sources utilized in your
environment. Simply uncomment the relevant line and enter the desired index. The "Sources" document details the specific entries in
this table that pertain to the individual data source filters that are included with SC4S.
* Other Splunk metadata (e.g. source and sourcetype) can be overriden via this file as well. This is an advanced topic, and further
Expand Down
4 changes: 2 additions & 2 deletions docs/gettingstarted/docker-systemd-general.md
Original file line number Diff line number Diff line change
Expand Up @@ -89,7 +89,7 @@ that are not provided out of the box in SC4S. To get you started, there is an e
and a filter (`example.conf`) in the `log_paths` and `filters` subdirectories, respectively. These should _not_ be used directly,
but copied as templates for your own log path development. They _will_ get overwritten at each SC4S start.

* In the `local/context` directory, if you change the "non-example" version of a file (e.g. `splunk_index.csv`) the changes
* In the `local/context` directory, if you change the "non-example" version of a file (e.g. `splunk_metadata.csv`) the changes
will be preserved on a restart.

* Create the subdirectory ``/opt/sc4s/archive``. This will be used as a mount point for local storage of syslog events
Expand Down Expand Up @@ -163,7 +163,7 @@ ExecStart=/usr/bin/docker run -p 514:514 -p 514:514/udp -p 6514:6514 -p 5000-502
Log paths are preconfigured to utilize a convention of index destinations that are suitable for most customers.

* If changes need to be made to index destinations, navigate to the ``/opt/sc4s/local/context`` directory to start.
* Edit `splunk_index.csv` to review or change the index configuration and revise as required for the data sources utilized in your
* Edit `splunk_metadata.csv` to review or change the index configuration and revise as required for the data sources utilized in your
environment. Simply uncomment the relevant line and enter the desired index. The "Sources" document details the specific entries in
this table that pertain to the individual data source filters that are included with SC4S.
* Other Splunk metadata (e.g. source and sourcetype) can be overriden via this file as well. This is an advanced topic, and further
Expand Down
4 changes: 2 additions & 2 deletions docs/gettingstarted/podman-systemd-general.md
Original file line number Diff line number Diff line change
Expand Up @@ -108,7 +108,7 @@ that are not provided out of the box in SC4S. To get you started, there is an e
and a filter (`example.conf`) in the `log_paths` and `filters` subdirectories, respectively. These should _not_ be used directly,
but copied as templates for your own log path development. They _will_ get overwritten at each SC4S start.

* In the `local/context` directory, if you change the "non-example" version of a file (e.g. `splunk_index.csv`) the changes
* In the `local/context` directory, if you change the "non-example" version of a file (e.g. `splunk_metadata.csv`) the changes
will be preserved on a restart.

* Create the subdirectory ``/opt/sc4s/archive``. This will be used as a mount point for local storage of syslog events
Expand Down Expand Up @@ -182,7 +182,7 @@ ExecStart=/usr/bin/podman run -p 514:514 -p 514:514/udp -p 6514:6514 -p 5000-502
Log paths are preconfigured to utilize a convention of index destinations that are suitable for most customers.

* If changes need to be made to index destinations, navigate to the ``/opt/sc4s/local/context`` directory to start.
* Edit `splunk_index.csv` to review or change the index configuration and revise as required for the data sources utilized in your
* Edit `splunk_metadata.csv` to review or change the index configuration and revise as required for the data sources utilized in your
environment. Simply uncomment the relevant line and enter the desired index. The "Sources" document details the specific entries in
this table that pertain to the individual data source filters that are included with SC4S.
* Other Splunk metadata (e.g. source and sourcetype) can be overriden via this file as well. This is an advanced topic, and further
Expand Down
2 changes: 1 addition & 1 deletion docs/sources/Checkpoint/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ The Splunk `host` field will be derived as follows
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Follow vendor configuration steps per Product Manual above

### Options
Expand Down
6 changes: 3 additions & 3 deletions docs/sources/Cisco/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -128,7 +128,7 @@ MSG Parse: This filter parses message content
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Follow vendor configuration steps per Product Manual above ensure:
* Log Level is 6 "Informational"
* Protocol is TCP/IP
Expand Down Expand Up @@ -200,7 +200,7 @@ Cisco Network Products of multiple types share common logging characteristics th
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* IOS Follow vendor configuration steps per Product Manual above ensure:
* Ensure a reliable NTP server is set and synced
* Log Level is 6 "Informational"
Expand Down Expand Up @@ -315,7 +315,7 @@ IP, Netmask, Host or Port
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Follow vendor configuration steps per Product Manual above

### Options
Expand Down
2 changes: 1 addition & 1 deletion docs/sources/Citrix/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ MSG Parse: This filter parses message content
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Follow vendor configuration steps per Product Manual above. Ensure the data format selected is "DDMMYYYY"

### Options
Expand Down
2 changes: 1 addition & 1 deletion docs/sources/Dell_RSA/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ NOTE: Java trace and exception will default to sc4s:fallback if the host/ip filt
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Refer to the admin manual for specific details of configuration

### Options
Expand Down
2 changes: 1 addition & 1 deletion docs/sources/F5/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ Must be identified by host or ip assignment. Update the filter `f_f5_bigip` or c
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Refer to the admin manual for specific details of configuration

### Options
Expand Down
2 changes: 1 addition & 1 deletion docs/sources/Forcepoint/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ MSG Parse: This filter parses message content
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Refer to the admin manual for specific details of configuration to send Reliable syslog using RFC 3195 format, a typical logging configuration will include the following features.


Expand Down
4 changes: 2 additions & 2 deletions docs/sources/Fortinet/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ MSG Parse: This filter parses message content
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Refer to the admin manual for specific details of configuration to send Reliable syslog using RFC 3195 format, a typical logging configuration will include the following features.

```
Expand Down Expand Up @@ -181,7 +181,7 @@ MSG Parse: This filter parses message content
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Refer to the admin manual for specific details of configuration to send Reliable syslog using RFC 3195 format, a typical logging configuration will include the following features.

```
Expand Down
2 changes: 1 addition & 1 deletion docs/sources/InfoBlox/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ Must be identified by host or ip assignment. Update the filter `f_infoblox` or c
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Refer to the admin manual for specific details of configuration

### Options
Expand Down
4 changes: 2 additions & 2 deletions docs/sources/Juniper/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index as required.
* Review and update the splunk_metadata.csv file and set the index as required.
* Follow vendor configuration steps per referenced Product Manual

### Options
Expand Down Expand Up @@ -86,7 +86,7 @@ Verify timestamp, and host values match as expected
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index as required.
* Review and update the splunk_metadata.csv file and set the index as required.
* Follow vendor configuration steps per Product Manual

### Options
Expand Down
2 changes: 1 addition & 1 deletion docs/sources/PaloaltoNetworks/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ MSG Parse: This filter parses message content
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Refer to the admin manual for specific details of configuration
* Select TCP or SSL transport option
* Select IETF Format
Expand Down
2 changes: 1 addition & 1 deletion docs/sources/Pfsense/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ Source does not provide a hostname, port or IP based filter is required
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Configure a dedicated SC4S port OR configure IP filter
* Refer to the Splunk TA documentation for the specific customer format required for proxy configuration
* Select TCP or SSL transport option
Expand Down
2 changes: 1 addition & 1 deletion docs/sources/Proofpoint/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ messages to create meaningful final output. This will require follow-on process
### Setup and Configuration

* Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
* Review and update the splunk_index.csv file and set the index and sourcetype as required for the data source.
* Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
* Follow vendor configuration steps per referenced Product Manual

### Options
Expand Down
Loading

0 comments on commit b2d9f64

Please sign in to comment.