Step by Step Guide For ObserveIT Splunk Integration NOTES
Step by Step Guide For ObserveIT Splunk Integration NOTES
Copyright 2011 ObserveIT Ltd. All rights reserved. Confidential and proprietary information for ObserveIT internal use only. No unauthorized copying or distribution permitted.
Page 1 of 10
1 USING SPLUNK
1. http address: http://10.2.56.71:8000/en-US/app/ObserveIT/ 2. user : admin 3. password: admin
4. To view User Activity Pie over time. Click on Search & reports 5. Select ObserveIT-Users over time
Copyright 2011 ObserveIT Ltd. All rights reserved. Confidential and proprietary information for ObserveIT internal use only. No unauthorized copying or distribution permitted.
Page 2 of 10
7. If you move the mouse over the pie, you will see the statistical data of the users activity
Copyright 2011 ObserveIT Ltd. All rights reserved. Confidential and proprietary information for ObserveIT internal use only. No unauthorized copying or distribution permitted.
Page 3 of 10
8. If you click on the users pie , you will get a new IE window with the list of meta data details of the user
9. Copy the HTTP video link and paste it into your Internet Explorer address 10. Make sure that your machine recognizes OITHostedDemo-S as 184.106.234.181 11. It can be done by modifying file: C:\Windows\System32\drivers\etc\hosts 12. Add the following line to the end of the file and save it 184.106.234.181 oithosteddemo-s
Copyright 2011 ObserveIT Ltd. All rights reserved. Confidential and proprietary information for ObserveIT internal use only. No unauthorized copying or distribution permitted.
Page 4 of 10
13. If NOT, then change OITHostedDemo-S to 184.106.234.181 http://OITHostedDemo-S:4884/ObserveIT/SlideViewer.aspx?SessionID=CE1A0D4E-C342-48B8ADC5-6CFB7F9A7702&DisplayOnAir=false&lang=en 14. You will need to provide ObserveIT user /password to see the video 15. The following report is also available from Search & Reports : ObserveIT-Server Usage (Top Values)
Copyright 2011 ObserveIT Ltd. All rights reserved. Confidential and proprietary information for ObserveIT internal use only. No unauthorized copying or distribution permitted.
Page 5 of 10
17. Click on Views->ObserveIT to see the following dashboard. 18. The pies are clickable and you can click on servers, Users, Applications, Logins, and get the list of events that are related to your request.
18.end
Copyright 2011 ObserveIT Ltd. All rights reserved. Confidential and proprietary information for ObserveIT internal use only. No unauthorized copying or distribution permitted.
Page 6 of 10
Copyright 2011 ObserveIT Ltd. All rights reserved. Confidential and proprietary information for ObserveIT internal use only. No unauthorized copying or distribution permitted.
Page 7 of 10
[monitor://D:\Users\ilan\Documents\ObserveIT\Splunk\LogFiles\1] disabled = 0
Copyright 2011 ObserveIT Ltd. All rights reserved. Confidential and proprietary information for ObserveIT internal use only. No unauthorized copying or distribution permitted.
Page 8 of 10
4 TROUBLESHOOTING
4.1 Splunk : Delete all events
1. C:\Program Files\Splunk\bin>splunk.exe stop 2. C:\Program Files\Splunk\bin>splunk.exe clean eventdata 3. C:\Program Files\Splunk\bin>splunk.exe Start 4.2 Splunk : Reload events
splunk.exe stop
splunk.exe add oneshot D:\temp\LogFiles\3\Data_Query_v4.log -sourcetype ObserveITUserActivity splunk.exe add oneshot C:\Monitor_Log_55_for_Splunk\log\Data_Query_v5.log -sourcetype ObserveITUserActivity
splunk.exe Start
Modify also: C:\Program Files\Splunk\etc\apps\learned\local\props.conf Add the following lines: [source::D:\temp\LogFiles\3\Data_Query_v4.log] sourcetype = ObserveIT User Activity [ObserveIT User Activity] CHECK_FOR_HEADER = TRUE [ObserveIT User Activity-2] KV_MODE = none REPORT-AutoHeader = AutoHeader-1
Copyright 2011 ObserveIT Ltd. All rights reserved. Confidential and proprietary information for ObserveIT internal use only. No unauthorized copying or distribution permitted.
Page 9 of 10
4.4
Enable automatic header-based field extraction for any source or source type by editing/ create props.conf. Edit this file in $SPLUNK_HOME/etc/system/local/, or your own custom application directory in $SPLUNK_HOME/etc/apps/<app_name>/local. Note: If you are using Splunk in a distributed environment, be sure to place the props.conf and transforms.conf files that you update for header-based field extraction on your search head, not the indexer. For more information on configuration files in general, see "About configuration files" in the Admin manual. To turn on automatic header-based field extraction for a source or source type, add CHECK_FOR_HEADER=TRUE under that source or source type's stanza in props.conf. Example props.conf entry for an MS Exchange source:
4.5
Copyright 2011 ObserveIT Ltd. All rights reserved. Confidential and proprietary information for ObserveIT internal use only. No unauthorized copying or distribution permitted.
Page 10 of 10