You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm pretty sure this doesn't follow best practices to index every field from every Cisco DNA event?
Additionally, removing that setting creates a separate problem because then the events are ingested as a JSON array which doesn't seem to be easily broken into separate events... Why wouldn't you have the script parse the results into separate JSON events first?
The text was updated successfully, but these errors were encountered:
@zapodeanu It does index the events individually for me with the default add-on configuration. However, I'm wondering why it's configured to use INDEXED_EXTRACTIONS as the default setting, since one of Splunk's main selling points is search-time field extractions (e.g. this mention of search time extractions being preferable: To avoid this, make sure you configure field extractions only at search time (which is generally preferable) or only at index time.). It seems like we're needlessly eating up disk space by default, and there doesn't seem to be a way to configure it to not index every field without altering the scripts within the add-on, which would be a non-trivial task, and, I believe, be overwritten by any add-on updates.
https://github.com/cisco-en-programmability/splunk-apps/blob/e3479b7487a3403c0b357ff95a48023593d5dd18/Splunk-TA-cisco-dnacenter/default/props.conf#L8C1-L8C21
I'm pretty sure this doesn't follow best practices to index every field from every Cisco DNA event?
Additionally, removing that setting creates a separate problem because then the events are ingested as a JSON array which doesn't seem to be easily broken into separate events... Why wouldn't you have the script parse the results into separate JSON events first?
The text was updated successfully, but these errors were encountered: