Splunk Search

Rapid7 App for Splunk Enterprise: How to change the "default" index so that the dashboard looks at another index?

windbishn
Explorer

When installing the Rapid7 App, I added to $SPLUNK_HOME\etc\apps\rapid7\local\inputs.conf under the [monitor] stanza index=nexpose_index. The data from the lookup tables is properly indexed into the correct index, although the dashboard and the saved searches are looking at the default index. Therefore, the dashboard shows "no results".

I'd rather not use the default index for this data. Any help would be appreciated.

1 Solution

lguinn2
Legend

If you send the data to a different index, then you will need to do one of two things:

1) Examine all the saved searches and the inline searches in all of the dashboards. Add index=nexpose_index to all of them as appropriate.

2) If the saved searches and inline searches contain index=main, then you need to change the searches (option #1). But if the searches do not indicate any index, then you can change the "indexes searched by default" for the roles that will be using this app. This change is made to the role(s), not the searches.

View solution in original post

lguinn2
Legend

If you send the data to a different index, then you will need to do one of two things:

1) Examine all the saved searches and the inline searches in all of the dashboards. Add index=nexpose_index to all of them as appropriate.

2) If the saved searches and inline searches contain index=main, then you need to change the searches (option #1). But if the searches do not indicate any index, then you can change the "indexes searched by default" for the roles that will be using this app. This change is made to the role(s), not the searches.

pdoconnell
Path Finder

to build in @lguinn's answer above, you need to add "index=" to the beginning of the following objects:
r7vulnexceptiondata
r7vulnerabilitydata
r7assetdata

They can all be found under the rapid7 app's Event Types, found at https://YOUR_HOST_NAME:8000/en-US/manager/search/saved/eventtypes

windbishn
Explorer

Thanks for responding, that is what I thought to be the answer as well. Adding "index=" to the rapid7 app's eventtypes did work.

0 Karma

pdoconnell
Path Finder

I haven't been able to find any reference to either sourcetypes or indexes in the dashboard configs. If anyone can see them, that would be enough I believe.

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...