icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading GCP Application Template for Splunk
SHA256 checksum (gcp-application-template-for-splunk_131.tgz) ba55913228a5b1a6fe6e5dc8ffc3ad6a8b849805937cc35db9de0154546cf904 SHA256 checksum (gcp-application-template-for-splunk_130.tgz) 0d7d18bc23eff931e788bf4ef4c9f4b22fa48558ad032eab6b4808ff49c73198 SHA256 checksum (gcp-application-template-for-splunk_120.tgz) 3186f655fc96444277ece7efce057880121b937db888ef1ce9a527cb8ca233e8 SHA256 checksum (gcp-application-template-for-splunk_110.tgz) 5652c82ebc63dd2b33d9f2d5bbe1cfba035a8b6cce4ae9cd7b8675911c13efe2
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

GCP Application Template for Splunk

Splunk Cloud
Splunk Labs
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
This application template provides visualizations, reports, and searches for Google Cloud Platform data gathered utilizing the Splunk Add-on for Google Cloud Platform ( https://splunkbase.splunk.com/app/3088/), Cloud Functions (https://github.com/splunk/splunk-gcp-functions) or GCP DataFlow Splunk Template. The purpose of this application template is to provide a starting point for various use cases involving GCP data. Add to, delete from, and modify this template to fit your own requirements, and correlate other data sources with GCP Data to provide greater Operational or Security Intelligence.
Note - Metrics data can be collected in 3 ways depending on your requirements - GCP Add-On (Event), Cloud Functions (Event or Metrics Store), Splunk Infrastructure Monitoring Add-On.

GCP Application Template for Splunk

This application template provides visualizations, reports, and searches for Google Cloud Platform data gathered utilizing the Splunk Add-on for Google Cloud Platform, Cloud Functions (see https://github.com/splunk/splunk-gcp-functions) or GCP DataFlow Splunk Template. The purpose of this application template is to provide a starting point for various use cases involving GCP data. Add to, delete from, and modify this template to fit your own requirements.
Correlate other data sources with GCP Data to provide greater Operational or Security Intelligence.
Note - Metrics data can be collected in 3 ways depending on your requirements - GCP Add-On (Event), Cloud Functions (Event or Metrics Store), Splunk Infrastructure Monitoring Add-On.

Each dashboard has the flexibility to allow for different collection and indexing methods. The reason for the need for this flexibility is that the format of the json data collected from PubSub differs between the Add-on and DataFlow - an additional "data." prefix layer is present with json content from the Add-On. Also, for performance reasons, it may be beneficial to use indexed extractions for the json content, which will allow for faster searches with tstats - the dashboards can be configured to use either standard and tstats searches. (see below for setup instructions)
Where metrics are required, it is possible to use metrics collected via the Add-On, Cloud functions (into metrics store), or by pulling from Splunk Infrastructure Monitoring using the SIM Add-On.

Pre-requisites / Dependencies:

Install the Google Cloud Platform Add-on for the knowledge objects. https://splunkbase.splunk.com/app/3088/

Add-Ons / Collection methods

This GCP App supports data to be collected into Splunk via the following methods:

1) Splunk Add-On for Google Cloud Platform (https://splunkbase.splunk.com/app/3088/)

All Data collection methods/sources supported (PubSub, Metrics, GCS)

2) GCP DataFlow. https://cloud.google.com/blog/products/data-analytics/connect-to-splunk-with-a-dataflow-template

All Data collected supported. (pre-install the GCP Add-On, and ensure all sourcetypes for HEC are set to the correct values)

3) Cloud Functions https://github.com/splunk/splunk-gcp-functions

All Data collected supported. (pre-install the GCP Add-On, and ensure all sourcetypes for HEC are set to the correct values)

4) Splunk Infrastructure Monitoring Add-on (SIM) https://splunkbase.splunk.com/app/5247/

All Metrics collected by SIM supported

Follow the instructions for these collection methods before setting up this app.

You will need assets information via Cloud Functions (see https://github.com/splunk/splunk-gcp-functions), or by using gcloud command / cron schedule (https://cloud.google.com/asset-inventory/docs/exporting-to-cloud-storage). For assets data, make sure you use the assets sourcetype below. (additional information is available here - https://www.splunk.com/en_us/blog/partners/taking-inventory-of-your-google-cloud.html)

Setup / Installation

Macros

The GCP app requires some initial setup of macros to work with your Splunk environment. Set the macro settings according to the tables below:

(Note that the current macro settings for the app can be viewed on the "setup" page on the App - if these are blank/empty, you will need to set them to the correct values before the dashboards work)

Splunk Add-On for Google Cloud Platform

If you are collecting the GCP Pub-Sub data via the GCP Add-On, and also collecting metrics via the Add-On, then you will need to set the following :

MacroValue (and default)Description
gcp_indexindex=gcp_indexSets the index where the GCP Data will be stored by the Add-On
datatagaddonAdds "data." as a JSON wrapper for PubSub Data
metricstagaddonSets the dashboards to use event based metrics from the Add-On
gcp_metricsindex=gcp_metricsSets the event index where the add-on stores the metrics
gcp_assets_index`gcp_index`Sets the event index where the asset information is stored. Default is set as the value for the gcp_index macro to be backward compatible

(note that if you are collecting metrics via Cloud Functions into Metrics store or using SIM, then the two metrics macros need to be set per the instructions below)

DataFlow

If you are using DataFlow (without transformations) to collect the data from PubSub with no compatibilty settings, then change the following. (note if you use compatibilty, you do not need to change this, and keep as addon):

MacroValueDescription
datatagdataflowThe payload from PubSub isn't "wrapped" by "data." by default.

SIM / SignalFX

If you are using the SIM / SignalFX (Splunk Infrastructure Monitoring) to collect metrics from GCP, you will need to use and configure connections on the SIM Add-On - https://splunkbase.splunk.com/app/5247/

Then set the following:

MacroValueDescription
metricstagsimSets the dashboards to use metrics collected from SIM / SignalFX using the Add-On

Cloud Functions

PubSub: Cloud Functions can send data in either Add-On or DataFlow formats - refer to the function documentation for details, and set the macros accordingly.
Metrics: Cloud Functions can send metrics in either Add-On format (event index) or into Metrics Store. If you are collecting metrics into the event index, use the same settings as the Add-On, otherwise if using the metrics store, use the following:

MacroValueDescription
metricstagmetricsSets the dashboards to use metrics store
gcp_metricsindex=gcp_metricsEnsure that this index is a METRICS index not event

Search Performance

If you want to have significantly faster searches using indexed json extractions with tstats, you will need to set the following:
(default is notstats)

MacroValue
tstatstagusetstats

Note also that you will need to apply props.conf and transforms.conf updates to your local GCP-Add-on settings to apply this setting, as it requires indexed extractions. (see below).

Setting this macro (keeping default) to "notstats" will use standard searches, but will provide slower "standard" search performance, but will not require any changes to your GCP Add-On configuration.

Props/Transforms

If you want to use tstats based searches for faster performance, you will need to apply these changes to your props.conf / transforms.conf in the local directory of the GCP Add-On.

props.conf

[google:gcp:pubsub:message]
INDEXED_EXTRACTIONS = json
AUTO_KV_JSON = false
SHOULD_LINEMERGE = false
TRUNCATE = 300000
CHARSET=UTF-8

[google:gcp:assets]
DATETIME_CONFIG = CURRENT
SHOULD_LINEMERGE = false
AUTO_KV_JSON = false
KV_MODE=none
INDEXED_EXTRACTIONS = json
LINE_BREAKER = ([\r\n]+)
NO_BINARY_CHECK = true
disabled = false
TRANSFORMS-sourcetype_splunk_gcp_compute_instance=gcp_compute_instance
TRUNCATE=50000

[google:gcp:buckets:jsondata]
KV_MODE = none
INDEXED_EXTRACTIONS = json
AUTO_KV_JSON = false

[google:gcp:compute:instance]
KV_MODE = none
INDEXED_EXTRACTIONS = json
AUTO_KV_JSON = false

[google:gcp:compute:vpc_flows]
KV_MODE = none
INDEXED_EXTRACTIONS = json
AUTO_KV_JSON = false

limits.conf

As some of the json in GCP's message payloads are large, you will need to apply this update to your limits.conf: ($SPLUNK_HOME$/etc/system/local/limits.conf)

[kv]
limit = 0
indexed_kv_limit = 0
maxchars = 20480
maxcols = 0
max_extractor_time = 2000

Release Notes

Version 1.1 Jan 2021

Initial release

Version 1.2

(minor updates and bugfixes)

Bugfixes (Compute Overview, vpc overview, iam overview)
Update to VPC & "Security Overview: Public Access" dashboards to align with other dashboards with datatags (compatability with Dataflow)
Update adding additional index for assets - gcp_assets_index. Backwards compatible
Update to default setting of usetstats macro - default is NOT to use this, i.e. the dashboards work without changing the default add-on sourcetype settings
Documentation update to transforms.conf and props.conf descriptions in the documentation:
- remove unused changes/ fix to props definitions which causes error
- added props.conf indexed extraction for google:gcp:buckets:jsondata
- added sourcetype descriptions
Added Service Account Activity External members access activity to IAM Activity Dashboard
Added VMs created by Default Service Account into IAM Activity Dashboard
Added Live Migrated Hosts to Compute Engine Overview

Release Notes

Version 1.3.1
Sept. 29, 2022

Version 1.3.1 September 2022

Version updated to support Splunk Add-on for Google Cloud Platform version 4.0.0 and Data Manager 1.7 (or later)
Minor fixes

Known Issue with Splunk 8.2 onwards:
If using the accelerated version with tstats searches, warnings will be shown on all dashboards. These messages can be ignored.

Version 1.3.0
Sept. 29, 2022

Version 1.3 September 2022

Version updated to support Splunk Add-on for Google Cloud Platform version 4.0.0 and Data Manager 1.7 (or later)

  • Includes minor bugfixes
  • Updates to sourceypes for compatability with new add-on. Noting that this is backwards compatible with eariler versions of the sourcetypes in previous releases.
  • New macros:
    "gcp_sourcetype_xx"= these support the new add-on sourcetypes - only change these if Add-On updates new sourcetypes
    "gke_internal_xx"= these are included to remove internal "noise" from gke service messages. (Infrastructure Activity dashboard). You can update this according to your requirements
Version 1.2.0
Nov. 26, 2021

Version 1.2

(minor updates and bugfixes)

Bugfixes (Compute Overview, vpc overview, iam overview)
Update to VPC & "Security Overview: Public Access" dashboards to align with other dashboards with datatags (compatibility with Dataflow)
Update adding additional index for assets - gcp_assets_index. (note that this is Backwards compatible)
Update to default setting of usetstats macro - default is NOT to use this, i.e. the dashboards work without changing the default add-on sourcetype settings
Documentation update to transforms.conf and props.conf descriptions in the documentation:
- remove unused changes/ fix to props definitions which causes error
- added props.conf indexed extraction for google:gcp:buckets:jsondata
- added sourcetype descriptions
Added Service Account Activity External members access activity to IAM Activity Dashboard
Added VMs created by Default Service Account into IAM Activity Dashboard
Added Live Migrated Hosts to Compute Engine Overview

Version 1.1.0
Jan. 18, 2021

Initial Splunkbase release


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.