All Apps and Add-ons

No data on CB app main dashboard

mnamestnik
Explorer

So I have the app setup right (I believe) with the server URL and an API token from my CB Reponse cluster. The reason that I believe I have it setup right is that I can perform successful binary and process searches from the 'Carbon Black Enterprise Response' drop down at the top left of the app. However, my main dashboard screen for that app shows 0 sensors reporting alerts, 0 alerts triggered, 0 banned hashes executed, and 0 master servers sending data. I know I've had alerts within CB during the time period that I've had this app installed/enabled as I spend half my day in the CB UI sifting through and resolving alerts. Is this a known bug, something misconfigured, and/or something I can easily fix myself? Would be nice to have it working so I could spend more time in Splunk instead of having to bounce back and forth. I am running 5.1.1 patch 3 on the CB response side, and Splunk 6.4.2 with the latest CB app from splunkbase. Thanks! (screenshot:https://imagebin.ca/v/2rfVOGApMQl4)

0 Karma
1 Solution

mnamestnik
Explorer

Hey, sorry, I totally forgot that I had even posted this since I never got a response. lol

So for me it ended up being that I was writing my CB data to a different index than main, and I was using a custom sourcetype as well on import for CIM purposes (and timestamp, since you have to specify where to look in the json data for timestamp or else Splunk defaults to the time it's imported to the index instead of the original time from the CB data itself). The definition in /opt/splunk/etc/apps/DA-ESS-CbResponse/default/macros.conf needed to be repointed to the index and sourcetype that my data actually was, in my case I was writing to the 'cb' index and was using a sourcetype of 'cb' as well, like the below:

definition = index="cb" sourcetype="cb"

Hope that helps

View solution in original post

mnamestnik
Explorer

Hey, sorry, I totally forgot that I had even posted this since I never got a response. lol

So for me it ended up being that I was writing my CB data to a different index than main, and I was using a custom sourcetype as well on import for CIM purposes (and timestamp, since you have to specify where to look in the json data for timestamp or else Splunk defaults to the time it's imported to the index instead of the original time from the CB data itself). The definition in /opt/splunk/etc/apps/DA-ESS-CbResponse/default/macros.conf needed to be repointed to the index and sourcetype that my data actually was, in my case I was writing to the 'cb' index and was using a sourcetype of 'cb' as well, like the below:

definition = index="cb" sourcetype="cb"

Hope that helps

jamesbrock
Path Finder

Thanks for taking the time, I was thinking it was something similar, I'll give that a try.

0 Karma

lfedak_splunk
Splunk Employee
Splunk Employee

@mnamestnik, Want to "Accept" your solution? 🙂

0 Karma

mnamestnik
Explorer

Haha, I guess, why not? 😉

0 Karma

jamesbrock
Path Finder

I have this same issue. Did you ever figure out how to fix it?

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...