Skip to content

Source types for the Splunk Add-on for Box

The Splunk Add-on for Box provides the index-time and search-time knowledge for Box events, metadata, user and group information, collaboration data, and tasks in the following formats.

Source type Description CIM data models
box:events Box enterprise audit events Authentication
Change
Alerts
DataAccess
Malware
box:file Box file metadata Inventory
box:fileComment Box file comments information Inventory
box:fileTask Task information about box files Inventory
box:folder Box file and folder metadata Inventory
box:folderCollaboration Box collaboration information on folders Inventory
box:groups Box group information Inventory
box:users Box user information Inventory
box:filecontent Sourcetype for content of txt, text, log files on Box none
box:filecontent:json Box JSON file content none
box:filecontent:xml Box XML file content none
box:filecontent:csv Box CSV file content none
box:addon:log Splunk Add-on for Box internal log none
box:addon:setup:log Splunk Add-on for Box internal installation log none