Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading HL7 Add-On for Splunk
MD5 checksum (hl7-add-on-for-splunk_109.tgz) 4b1f50b5d09327a21887cc2bc0aa1322 MD5 checksum (hl7-add-on-for-splunk_108.tgz) 29b1a66c795d9f38e535dd36248320ab MD5 checksum (hl7-add-on-for-splunk_107.tgz) 0a9a82cd54b39e5a25aaeb71d16a3c08 MD5 checksum (hl7-add-on-for-splunk_106.tgz) 673627a43d86444e642ec53d9b60cbee MD5 checksum (hl7-add-on-for-splunk_105.tgz) 860468295d1a581962581a173acb44d5
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

HL7 Add-On for Splunk

Overview
Details
Note: Previously Add-On for HL7 (https://splunkbase.splunk.com/app/3068/)

The value from this Add-on is derived by it's ability to:

1. Parse every HL7 message from log entry.*
2. Extract every segment within any HL7 v2.x message into it's own Splunk Field.**
3. Extract every field within every segment in the message.**
4. Provide examples on how to extract values from HL7 subfields.
i.e. PID-5 contains family_name,given_name,middle_name,suffix,prefix,degree.
Individual fields are created for each of these.
5. Provide examples on how to enrich HL7 coded values with actual contextual descriptions.
i.e. MSH-9 may have ADT^A08.
A new field Message_Type will also be present with a value of "Update Patient Information"

If the logs come from Cloverleaf's Interface engine there are additional extractions for thread_id, client ip, and client port.

Configuration

To use this add-on, manually configure the data input with the following input.conf
properties and the add-on will optimize the data automatically.

sourcetype = hl7_v2

These properties will also be utilized by the underlying searches and eventtypes .

The value from this Add-on is derived by it's ability to:

  1. Parse every HL7 message from log entry.*
  2. Extract every segment within any HL7 v2.x message into it's own Splunk Field.**
  3. Extract every field within every segment in the message.**
  4. Provide examples on how to extract values from HL7 subfields.
    i.e. PID-5 contains family_name,given_name,middle_name,suffix,prefix,degree.
    Individual fields are created for each of these.
  5. Provide examples on how to enrich HL7 coded values with actual contextual descriptions.
    i.e. MSH-9 may have ADT^A08.
    A new field Message_Type will also be present with a value of "Update Patient Information"

If the logs come from Cloverleaf's Interface engine there are additional extractions for thread_id, client ip, and client port.

Notes:
*The datetime format can vary for each HL7 message. In lieu of using TIME_FORMAT inside props.conf
a custom datetime.xml was created inside this app. The extracted groups correspond to those specified
in the extracted attribute for define element. The groups (year, month, day, etc.) are specified in
Splunk's default datetime.xml in /etc/system/datetime.xml.

**Repeating Segments will be placed inside multi-value fields.
i.e. If there are four NTE segments in the message there will be one multi-value NTE field with four values.
The subsequent HL7 fields will only be extracted for the first segment in repeating segments.

Sample Files

The reference files used for this Add-on can be found in the cloverleaf_logs directory.

The samples directory contains files used to generate sample messages. If you add Splunk's Eventgen these samples will be replayed and put in the hl7 index. Please see https://github.com/splunk/eventgen and use the develop branch.

You'll also need to modify splunkUser and splunkPass in eventgen.conf to match credentials on your system.

Panels and Dashboards

This Add-On currently has prebuilt Panels and Dashboards.

Panels

HL7 - Events by Message Type - Over Time
HL7 - Event Count by Message Type - Over Time
HL7 - Raw Events - Over Time

Dashboards

Patient Activity History
TRANSACTION CONVERSION (assumes you also ingest the corresponding HL7 ACKs)

Special Thanks

To Davin Studer and The Vancouver Clinic that allowed extensive regression testing on this Add-On.

Release Notes

Version 1.09
March 29, 2017

-Updated Message Type Lookup ( hl7_v2_message_types.csv). Please use Message_Type_Description in lieu of previous Message_Type in your searches.

Version 1.08
Oct. 5, 2016

- Updated files in samples to replay messages with missing patient names and identifiers.
- Put SEDCMD back to replace carriage returns with line feeds.

Version 1.07
Oct. 5, 2016

- Removed indexes.conf
- Added instructions to README.md for extracting individual segments when they are repeating.
- Modified files in samples for eventgen to populate the default/main index instead of previously used hl7 index.

Version 1.06
Oct. 4, 2016

- Modified LINE_BREAKER in props.conf to properly parse HL7 messages that contain "MSH" in the actual message, not just the three first characters.
- Commented out SEDCMD in props.conf for replacing carriage return with line feed.
- Added new sample file in cloverleaf_logs

Version 1.05
Aug. 25, 2016

=== Splunk TA HL7 (Add-On) ===

Author: Joe Welsh - Splunk
Version/Date: 1.05 August 25, 2016
*Note: This app was previously Add-on for HL7

Supported product(s):
This add-on supports logs containing HL7 v2.X data.

Source type(s): This add-on will process data that is source-typed
as "hl7_v2".

Input requirements: N/A

36
Installs
223
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

Splunk Certification Program

Splunk's App Certification program uses a specific set of criteria to evaluate the level of quality, usability and security your app offers to its users. In addition, we evaluate the documentation and support you offer to your app's users.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2017 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.