

Don't share it with unauthorized individuals or email it to anyone under any circumstances! Secure it as you would any sensitive credential.

The security of your Duo application is tied to the security of your secret key (skey). You can view your integration key, secret key, and API hostname at the top of the new Admin API application's page. You may also rename the Admin API application under the "Settings" section. Do not check the boxes next to any other permissions. Under the "Settings" section for this application locate the "Permissions" section and check the boxes next to Grant read information, Grant read log, and Grand read resource. See Protecting Applications for more information about protecting applications in Duo and additional application options. You'll need this information to complete your setup. Click Protect to the far-right to configure the application and get your integration key, secret key, and API hostname. Log in to the Duo Admin Panel as an administrator with the Owner role and navigate to Applications.Ĭlick Protect an Application and locate the entry for Admin API in the applications list. Duo Splunk Connector requires a Duo Beyond, Duo Access, or Duo MFA plan. Administrators can create new dashboards or manipulate the existing dashboards. The connector comes populated with default dashboards for the above logs. Endpoint Logs - Duo Beyond and Duo Access plans only.Once configured, the connector automatically pulls in the following Duo logs for the last 30 days: This document takes you through installing and configuring the Duo Splunk Connector in your Splunk environment. Suppose due to some reason data coming from the file went missing/didn’t get indexed for the timestamps 09/29/18 5:05:XX to 09/29/18 10:12:XX, but after that the indexing process is working normally, thenġ) Copy the file contents which haven’t been indexed ( from timestamp 09/29/18 5:05:XX to 09/29/18 10:12:XX ) to a temporary file, say tmp_file.txtĢ) Create a new input stanza in “ nf ” for tmp_file.txt Ĭongrats!! NOW, You have the data indexed that was missing from splunk previously.Duo Splunk Connector allow administrators to easily import their Duo logs into their Splunk environment. PROCESS 3: Re-index your file contents based on timestamp for which data has not been indexed in splunk

–> This should re-index the contents of your file –> i ndex contents before resetting btprobe splunk cmd btprobe -d $SPLUNK_HOME/var/lib/splunk/fishbucket/splunk_private_dbīelow are the screenshots for your reference (using the same index for better understanding ) …. Any changes you make to the fishbucket using btprobe takes effect only after a restart.ĬAUTION: You must stop your splunk instance before using btprobe. There may be situations, when you only want to re-index the data for a particular file, then you can use the command given below to reset btprobe (run the command on the splunk instance forwarding data)ītprobe: It queries the fishbucket for checkpoints stored by monitor inputs.

PROCESS 2: Re-index data without deleting the fishbucket/re-index contents of any specific file Now, as soon as your files are updated on the application server, the whole contents of your files will be re-indexed into splunk in their corresponding indexes. –> restart your splunk instance ( $SPLUNK_HOME/bin/splunk restart) –> deleting/removing the fish bucket i) #cd $SPLUNK_HOME/var/lib/splunk ii) # rm -rf fishbucket –> index contents before deleting the fishbucket See the pictures below for further reference, Delete/Remove the sub-directory fishbucket Move to the directory /opt/splunk/var/lib/splunk ( on the instance forwarding data)Ģ.
#Splunk add a file monitor input to send events to the index license
splunk start PROCESS 1: Remove/delete the fishbucket sub-directory which should re-index all your data in all of your indexes.ĬAUTION : Deleting the fishbucket sub-directory will re-index data coming into all your indexes from that splunk forwarder/instance, thus may severely impact your license usage.ġ. ( to clean All Indexes, just drop off -index ) iv) #. If you want to clean your existing data from any of your index before going for re-indexing process, use the commands below. Following are the techniques to re-index your data: Sometimes, due to some unavoidable reasons data loss may occur while indexing or partial indexing may take place, then you might want to re-index all your data again into Splunk.
