<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to detect missing log sources/Internal logs in Splunk? in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482215#M9170</link>
    <description>&lt;P&gt;Please help me in detecting the below scenarios for alerting.&lt;/P&gt;
&lt;P&gt;1) If a UF stops forwarding the actual source logs (Example: Windows Event Logs ) but it is forwarding the _internal logs.&lt;BR /&gt;2) if a UF stops forwarding actual source logs and _internal logs.&lt;BR /&gt;3) How to find whether the UF is reporting to Deployment Server from Search Head.&lt;/P&gt;
&lt;P&gt;Also, please let me know the solution/process for the above if &lt;BR /&gt;a) HF is configured in the Splunk Environment.&lt;BR /&gt;b) When HF is not configured in the Splunk Environment.&lt;/P&gt;
&lt;P&gt;I have checked the app UFMA app in Splunk Base. But I don't know whether it can fulfill my needs as I can't make deployment server as a search peer which is required for the UFMA app to function.&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jun 2020 18:28:33 GMT</pubDate>
    <dc:creator>potnuru</dc:creator>
    <dc:date>2020-06-24T18:28:33Z</dc:date>
    <item>
      <title>How to detect missing log sources/Internal logs in Splunk?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482215#M9170</link>
      <description>&lt;P&gt;Please help me in detecting the below scenarios for alerting.&lt;/P&gt;
&lt;P&gt;1) If a UF stops forwarding the actual source logs (Example: Windows Event Logs ) but it is forwarding the _internal logs.&lt;BR /&gt;2) if a UF stops forwarding actual source logs and _internal logs.&lt;BR /&gt;3) How to find whether the UF is reporting to Deployment Server from Search Head.&lt;/P&gt;
&lt;P&gt;Also, please let me know the solution/process for the above if &lt;BR /&gt;a) HF is configured in the Splunk Environment.&lt;BR /&gt;b) When HF is not configured in the Splunk Environment.&lt;/P&gt;
&lt;P&gt;I have checked the app UFMA app in Splunk Base. But I don't know whether it can fulfill my needs as I can't make deployment server as a search peer which is required for the UFMA app to function.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2020 18:28:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482215#M9170</guid>
      <dc:creator>potnuru</dc:creator>
      <dc:date>2020-06-24T18:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to detect missing log sources/Internal logs in Splunk?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482216#M9171</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/34483"&gt;@potnuru&lt;/a&gt;,&lt;BR /&gt;
some little clarifications:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;are item 1 and 2 in the same search or in different ones?&lt;/LI&gt;
&lt;LI&gt;what do you mean in item3: to know if the UF is listed in deployment clients list of Deployment Server or what else?&lt;/LI&gt;
&lt;LI&gt;what do you mean in the second part of your question ("configured")?&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Anyway the first two items could be solved in this way:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;create a lookup (called e.g. perimeter.csv) containing the list of the monitored hosts (at least one column called e.g. host);&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;run a search like this:&lt;/P&gt;

&lt;P&gt;| metasearch index=_internal OR index=*&lt;BR /&gt;
| eval host=lower(host), type=if(index=_internal,"Internal","Other Indexes")&lt;BR /&gt;
| stats values(type) AS type count BY host&lt;BR /&gt;
| append [ | inputlookup perimeter.csv | eval host=lower(host), count=0, type="Not Present" | fields host count type ]&lt;BR /&gt;
| stats values(type) AS type sum(count) AS total BY host&lt;BR /&gt;
| eval Status=if(type="Not Present","Not Present", if(type="Internal","Internal","Both Internal and Others"))&lt;BR /&gt;
| table host Status&lt;/P&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:27:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482216#M9171</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-09-30T04:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to detect missing log sources/Internal logs in Splunk?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482217#M9172</link>
      <description>&lt;P&gt;Hi @gcusello &lt;/P&gt;

&lt;P&gt;Thank you for your response.&lt;/P&gt;

&lt;P&gt;The Item 1 and Item 2 are two different scenarios and I want to create a single Dashboard for both of these where I want to show them in same Panel with different colors or severity.&lt;/P&gt;

&lt;P&gt;Item 3 is to detect the last phone home time of a UF from search head and not on Deployment server.&lt;/P&gt;

&lt;P&gt;The second part of my question is 1&lt;BR /&gt;
a) what will be the query if HF is used between UF and Indexer.&lt;BR /&gt;
b) if HF is not present between UF and Indexer.&lt;/P&gt;

&lt;P&gt;Basically I want to know if there is any difference in the query if HF is present in between UF and Indexer.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 04:44:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482217#M9172</guid>
      <dc:creator>potnuru</dc:creator>
      <dc:date>2020-03-05T04:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to detect missing log sources/Internal logs in Splunk?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482218#M9173</link>
      <description>&lt;P&gt;Hi @potnuru,&lt;BR /&gt;
so does my answer solve the first two questions or do you want in the same panel also the info of last connection?&lt;BR /&gt;
Anyway to add also this info to the same panel, you cannot use the &lt;CODE&gt;| metasearch&lt;/CODE&gt; command so your search will be slower.&lt;BR /&gt;
Anyway you have to add to the stats commands an option with the latest _time, something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal OR index=*
| eval host=lower(host), type=if(index=_internal,"Internal","Other Indexes")
| stats values(type) AS type latest(_time) AS latest count BY host
| append [ | inputlookup perimeter.csv | eval host=lower(host), count=0, type="Not Present" | fields host count type ]
| stats values(type) AS type values(latest) AS latest sum(count) AS total BY host
| eval Status=if(type="Not Present","Not Present", if(type="Internal","Internal","Both Internal and Others"))
| table host Status latest
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;About the second part, I cannot help you, for my knowledge, there isn't any way to understand if there's or not an HF between UFs and INDs, I hope that someone else denies me.&lt;BR /&gt;
As a workaround, you could add to the perimeter.csv lookup a field with this information and use it in the search.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 07:41:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482218#M9173</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-03-05T07:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to detect missing log sources/Internal logs in Splunk?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482219#M9174</link>
      <description>&lt;P&gt;Thank you @gcusello for your help.&lt;/P&gt;

&lt;P&gt;From the above query, I can understand that the last log received for the index is shown in the table as latest.&lt;/P&gt;

&lt;P&gt;Is this query is same even if we use the HF in between UF and Indexer?&lt;/P&gt;

&lt;P&gt;Also, how can we get the last deployment server Phone Home time in Search Head?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 10:07:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482219#M9174</guid>
      <dc:creator>potnuru</dc:creator>
      <dc:date>2020-03-06T10:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to detect missing log sources/Internal logs in Splunk?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482220#M9175</link>
      <description>&lt;P&gt;Hi @potnuru,&lt;BR /&gt;
the presence of an HF doesn't change the search because data starts from UFs and arrive to Indexers where a I search using a Search Head: an intermediate HF doesn't change the data (for this reason I cannot know if there's an intermediate HF in a data.&lt;BR /&gt;
Really HF parse the data and send coocked data to Indexers but is doesn't add any information to understand this.&lt;/P&gt;

&lt;P&gt;About the last Deployment Server Phone Home, you could search &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal host=your_deployment_server "Running phone"
| stats latest(_time) AS latest BY hostname
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 12:02:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482220#M9175</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-03-06T12:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to detect missing log sources/Internal logs in Splunk?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482221#M9176</link>
      <description>&lt;P&gt;Thank you @gcusello for being so helpful.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 12:40:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482221#M9176</guid>
      <dc:creator>potnuru</dc:creator>
      <dc:date>2020-03-06T12:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to detect missing log sources/Internal logs in Splunk?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482222#M9177</link>
      <description>&lt;P&gt;You're welcome!&lt;BR /&gt;
Ciao and next time.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 12:46:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-detect-missing-log-sources-Internal-logs-in-Splunk/m-p/482222#M9177</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-03-06T12:46:26Z</dc:date>
    </item>
  </channel>
</rss>

