<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to parse Events in splunk for more useful dashboard panels in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579794#M47485</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;&amp;nbsp; Thanks a lot. It helped to filter out the following info(&lt;SPAN&gt;views into failed mounts and types of failures(views into failed mounts and types of failures&lt;/SPAN&gt;). However, im scratching my head to get the following info from the events, but not getting any clue to filter it out.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Realtime views around created/started containers/pod and failures&lt;/LI&gt;&lt;LI&gt;Realtime views on image pulls, success, backoffs, failures, denies&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;How can i attach the events list csv file here?&lt;/P&gt;</description>
    <pubDate>Mon, 03 Jan 2022 15:13:27 GMT</pubDate>
    <dc:creator>karthiklen</dc:creator>
    <dc:date>2022-01-03T15:13:27Z</dc:date>
    <item>
      <title>how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579545#M47444</link>
      <description>&lt;P&gt;Currently it's difficult to parse out the details of Cluster events in Splunk, to enable more useful Dashboard panels. Looking for suggestions to figure out a way to extract from the splunk event.go events, the columns that we would see when we run "oc get events" on a cluster; &lt;STRONG&gt;namespace, last seen, type, reason, object, message.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Once we can extract those fields and make available as variables for splunk stats/tables/timechart, we can put some useful panels together to gauge plant health.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Realtime views around created/started containers/pod and failures&lt;/LI&gt;&lt;LI&gt;Realtime views around job start/failure/complete&lt;/LI&gt;&lt;LI&gt;Realtime views into failed mounts and types of failures&lt;/LI&gt;&lt;LI&gt;Realtime views on image pulls, success, backoffs, failures, denies&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Appreciate the help with any docs/leads and high level ideas to achieve this please.&lt;/P&gt;&lt;P&gt;Sample Events:&lt;/P&gt;&lt;P&gt;Time Event&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;12/30/21&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;1:59:07.000 AM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;lt;&lt;SPAN class=""&gt;135&lt;/SPAN&gt;&amp;gt;&lt;SPAN class=""&gt;Dec&lt;/SPAN&gt; &lt;SPAN class=""&gt;30&lt;/SPAN&gt; &lt;SPAN class=""&gt;06:59:07&lt;/SPAN&gt; &lt;SPAN class=""&gt;9000n2.nodes.com&lt;/SPAN&gt; &lt;SPAN class=""&gt;kubernetes.var.log.containers.ku:&lt;/SPAN&gt; &lt;SPAN class=""&gt;namespace_name=openshift-kube-controller-manager&lt;/SPAN&gt;, &lt;SPAN class=""&gt;container_name=kube-controller-manager&lt;/SPAN&gt;, &lt;SPAN class=""&gt;pod_name=kube-controller-manager-9000n2.nodes.com&lt;/SPAN&gt;, &lt;SPAN class=""&gt;message=I1230&lt;/SPAN&gt; &lt;SPAN class=""&gt;06:58:56.139184&lt;/SPAN&gt; &lt;SPAN class=""&gt;1&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;event.go&lt;/SPAN&gt;:291&lt;/SPAN&gt;] "&lt;SPAN class=""&gt;Event&lt;/SPAN&gt; &lt;SPAN class=""&gt;occurred&lt;/SPAN&gt;" &lt;SPAN class=""&gt;object=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;openshift-logging/elasticsearch-im-infra&lt;/SPAN&gt;" &lt;SPAN class=""&gt;kind=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;CronJob&lt;/SPAN&gt;" &lt;SPAN class=""&gt;apiVersion=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;batch/v1beta1&lt;/SPAN&gt;" &lt;SPAN class=""&gt;type=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;Warning&lt;/SPAN&gt;" &lt;SPAN class=""&gt;reason=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;FailedNeedsStart&lt;/SPAN&gt;" &lt;SPAN class=""&gt;message=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;Cannot&lt;/SPAN&gt; &lt;SPAN class=""&gt;determine&lt;/SPAN&gt; &lt;SPAN class=""&gt;if&lt;/SPAN&gt; &lt;SPAN class=""&gt;job&lt;/SPAN&gt; &lt;SPAN class=""&gt;needs&lt;/SPAN&gt; &lt;SPAN class=""&gt;to&lt;/SPAN&gt; &lt;SPAN class=""&gt;be&lt;/SPAN&gt; &lt;SPAN class=""&gt;started:&lt;/SPAN&gt; &lt;SPAN class=""&gt;too&lt;/SPAN&gt; &lt;SPAN class=""&gt;many&lt;/SPAN&gt; &lt;SPAN class=""&gt;missed&lt;/SPAN&gt; &lt;SPAN class=""&gt;start&lt;/SPAN&gt; &lt;SPAN class=""&gt;time&lt;/SPAN&gt; (&amp;gt; &lt;SPAN class=""&gt;100&lt;/SPAN&gt;)&lt;SPAN class=""&gt;.&lt;/SPAN&gt; &lt;SPAN class=""&gt;Set&lt;/SPAN&gt; &lt;SPAN class=""&gt;or&lt;/SPAN&gt; &lt;SPAN class=""&gt;decrease&lt;/SPAN&gt; &lt;SPAN class=""&gt;.spec.startingDeadlineSeconds&lt;/SPAN&gt; &lt;SPAN class=""&gt;or&lt;/SPAN&gt; &lt;SPAN class=""&gt;check&lt;/SPAN&gt; &lt;SPAN class=""&gt;clock&lt;/SPAN&gt; &lt;SPAN class=""&gt;skew"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;SPAN class=""&gt;host =&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A title="laas-agent-log-forwarder-6dddb6d69c-95t4b" href="https://secure-splunk-ei.ms.com/en-US/app/search/search?q=search%20index%3Dlog-135473-prod%20event.go%20NOT%20%22l0.ms.com%22&amp;amp;display.page.search.mode=verbose&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-60m%40m&amp;amp;latest=now&amp;amp;sid=1640847563.26206_E2314982-117F-41CC-A2EF-3C5AEB241C6A#" target="_blank" rel="noopener"&gt;laas-agent-log-forwarder-6dddb6d69c-95t4b&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;source =&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A title="/namespace/openshift-kube-controller-manager" href="https://secure-splunk-ei.ms.com/en-US/app/search/search?q=search%20index%3Dlog-135473-prod%20event.go%20NOT%20%22l0.ms.com%22&amp;amp;display.page.search.mode=verbose&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-60m%40m&amp;amp;latest=now&amp;amp;sid=1640847563.26206_E2314982-117F-41CC-A2EF-3C5AEB241C6A#" target="_blank" rel="noopener"&gt;/namespace/openshift-kube-controller-manager&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;sourcetype =&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A title="ocpprod.steppingstone-infra1-pod1-devin1-openshift-kube-controller-manager:application" href="https://secure-splunk-ei.ms.com/en-US/app/search/search?q=search%20index%3Dlog-135473-prod%20event.go%20NOT%20%22l0.ms.com%22&amp;amp;display.page.search.mode=verbose&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-60m%40m&amp;amp;latest=now&amp;amp;sid=1640847563.26206_E2314982-117F-41CC-A2EF-3C5AEB241C6A#" target="_blank" rel="noopener"&gt;ocpprod.stepping-infra-openshift-kube-controller-manager:application&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;12/30/21&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;1:59:07.000 AM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;lt;&lt;SPAN class=""&gt;135&lt;/SPAN&gt;&amp;gt;&lt;SPAN class=""&gt;Dec&lt;/SPAN&gt; &lt;SPAN class=""&gt;30&lt;/SPAN&gt; &lt;SPAN class=""&gt;06:59:07&lt;/SPAN&gt; &lt;SPAN class=""&gt;9000n2.nodes.com&lt;/SPAN&gt; &lt;SPAN class=""&gt;kubernetes.var.log.containers.ku:&lt;/SPAN&gt; &lt;SPAN class=""&gt;namespace_name=openshift-kube-controller-manager&lt;/SPAN&gt;, &lt;SPAN class=""&gt;container_name=kube-controller-manager&lt;/SPAN&gt;, &lt;SPAN class=""&gt;pod_name=kube-controller-manager-9000n2.nodes.com&lt;/SPAN&gt;, &lt;SPAN class=""&gt;message=I1230&lt;/SPAN&gt; &lt;SPAN class=""&gt;06:58:56.133312&lt;/SPAN&gt; &lt;SPAN class=""&gt;1&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;event.go&lt;/SPAN&gt;:291&lt;/SPAN&gt;] "&lt;SPAN class=""&gt;Event&lt;/SPAN&gt; &lt;SPAN class=""&gt;occurred&lt;/SPAN&gt;" &lt;SPAN class=""&gt;object=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;openshift-logging/elasticsearch-im-audit&lt;/SPAN&gt;" &lt;SPAN class=""&gt;kind=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;CronJob&lt;/SPAN&gt;" &lt;SPAN class=""&gt;apiVersion=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;batch/v1beta1&lt;/SPAN&gt;" &lt;SPAN class=""&gt;type=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;Warning&lt;/SPAN&gt;" &lt;SPAN class=""&gt;reason=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;FailedNeedsStart&lt;/SPAN&gt;" &lt;SPAN class=""&gt;message=&lt;/SPAN&gt;"&lt;SPAN class=""&gt;Cannot&lt;/SPAN&gt; &lt;SPAN class=""&gt;determine&lt;/SPAN&gt; &lt;SPAN class=""&gt;if&lt;/SPAN&gt; &lt;SPAN class=""&gt;job&lt;/SPAN&gt; &lt;SPAN class=""&gt;needs&lt;/SPAN&gt; &lt;SPAN class=""&gt;to&lt;/SPAN&gt; &lt;SPAN class=""&gt;be&lt;/SPAN&gt; &lt;SPAN class=""&gt;started:&lt;/SPAN&gt; &lt;SPAN class=""&gt;too&lt;/SPAN&gt; &lt;SPAN class=""&gt;many&lt;/SPAN&gt; &lt;SPAN class=""&gt;missed&lt;/SPAN&gt; &lt;SPAN class=""&gt;start&lt;/SPAN&gt; &lt;SPAN class=""&gt;time&lt;/SPAN&gt; (&amp;gt; &lt;SPAN class=""&gt;100&lt;/SPAN&gt;)&lt;SPAN class=""&gt;.&lt;/SPAN&gt; &lt;SPAN class=""&gt;Set&lt;/SPAN&gt; &lt;SPAN class=""&gt;or&lt;/SPAN&gt; &lt;SPAN class=""&gt;decrease&lt;/SPAN&gt; &lt;SPAN class=""&gt;.spec.startingDeadlineSeconds&lt;/SPAN&gt; &lt;SPAN class=""&gt;or&lt;/SPAN&gt; &lt;SPAN class=""&gt;check&lt;/SPAN&gt; &lt;SPAN class=""&gt;clock&lt;/SPAN&gt; &lt;SPAN class=""&gt;skew"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;SPAN class=""&gt;host =&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A title="laas-agent-log-forwarder-6dddb6d69c-95t4b" href="https://secure-splunk-ei.ms.com/en-US/app/search/search?q=search%20index%3Dlog-135473-prod%20event.go%20NOT%20%22l0.ms.com%22&amp;amp;display.page.search.mode=verbose&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-60m%40m&amp;amp;latest=now&amp;amp;sid=1640847563.26206_E2314982-117F-41CC-A2EF-3C5AEB241C6A#" target="_blank" rel="noopener"&gt;laas-agent-log-forwarder-6dddb6d69c-95t4b&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;source =&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A title="/namespace/openshift-kube-controller-manager" href="https://secure-splunk-ei.ms.com/en-US/app/search/search?q=search%20index%3Dlog-135473-prod%20event.go%20NOT%20%22l0.ms.com%22&amp;amp;display.page.search.mode=verbose&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-60m%40m&amp;amp;latest=now&amp;amp;sid=1640847563.26206_E2314982-117F-41CC-A2EF-3C5AEB241C6A#" target="_blank" rel="noopener"&gt;/namespace/openshift-kube-controller-manager&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;sourcetype =&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A title="ocpprod.steppingstone-infra1-pod1-devin1-openshift-kube-controller-manager:application" href="https://secure-splunk-ei.ms.com/en-US/app/search/search?q=search%20index%3Dlog-135473-prod%20event.go%20NOT%20%22l0.ms.com%22&amp;amp;display.page.search.mode=verbose&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=-60m%40m&amp;amp;latest=now&amp;amp;sid=1640847563.26206_E2314982-117F-41CC-A2EF-3C5AEB241C6A#" target="_blank" rel="noopener"&gt;ocpprod.stepping-infra-openshift-kube-controller-manager:application&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Thu, 30 Dec 2021 07:10:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579545#M47444</guid>
      <dc:creator>karthiklen</dc:creator>
      <dc:date>2021-12-30T07:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579547#M47445</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/241817"&gt;@karthiklen&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;let me understand: you have problems to extract the needed fields from your logs or what else?&lt;/P&gt;&lt;P&gt;If this is your need, please try this regex to create a field extraction to use in all your panels:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;^\&amp;lt;\d+\&amp;gt;(?&amp;lt;last_seen&amp;gt;\w+\s+\d+\s+\d+:\d+:\d+).*namespace_name\=(?&amp;lt;namespace_name&amp;gt;[^,]+),\s+container_name\=(?&amp;lt;container_name&amp;gt;[^,]+),\s+pod_name\=(?&amp;lt;pod_name&amp;gt;[^,]+),\s+message\=(?&amp;lt;message1&amp;gt;[^\]]+).*object\=\"(?&amp;lt;object&amp;gt;[^\"]+)\"\s+kind\=\"(?&amp;lt;kind&amp;gt;[^\"]+)\"\s+apiVersion\=\"(?&amp;lt;apiVersion&amp;gt;[^\"]+)\"\s+type\=\"(?&amp;lt;type&amp;gt;[^\"]+)\"\s+reason\=\"(?&amp;lt;reason&amp;gt;[^\"]+)\"\s+message\=\"(?&amp;lt;message2&amp;gt;[^\"]+)\"&lt;/LI-CODE&gt;&lt;P&gt;That you can test at&amp;nbsp;&lt;A href="https://regex101.com/r/OmVEZl/1" target="_blank"&gt;https://regex101.com/r/OmVEZl/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 30 Dec 2021 07:31:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579547#M47445</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2021-12-30T07:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579555#M47446</link>
      <description>&lt;P&gt;Thanks much&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yeah, your understand is correct. Need to extract the required fields(&lt;STRONG&gt;namespace, last seen, type, reason, object, message&lt;/STRONG&gt;) from the sample log and use those fields to create different new panels.&lt;/P&gt;&lt;P&gt;The search query which you provided seems promising and helpful.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does below query looks good?&lt;/P&gt;&lt;P&gt;index=log-135473-prod event.go NOT "l0.ms.com" &lt;STRONG&gt;| rex field=_raw&lt;/STRONG&gt; ^\&amp;lt;\d+\&amp;gt;(?&amp;lt;last_seen&amp;gt;\w+\s+\d+\s+\d+:\d+:\d+).*namespace_name\=(?&amp;lt;namespace_name&amp;gt;[^,]+),\s+container_name\=(?&amp;lt;container_name&amp;gt;[^,]+),\s+pod_name\=(?&amp;lt;pod_name&amp;gt;[^,]+),\s+message\=(?&amp;lt;message1&amp;gt;[^\]]+).*object\=\"(?&amp;lt;object&amp;gt;[^\"]+)\"\s+kind\=\"(?&amp;lt;kind&amp;gt;[^\"]+)\"\s+apiVersion\=\"(?&amp;lt;apiVersion&amp;gt;[^\"]+)\"\s+type\=\"(?&amp;lt;type&amp;gt;[^\"]+)\"\s+reason\=\"(?&amp;lt;reason&amp;gt;[^\"]+)\"\s+message\=\"(?&amp;lt;message2&amp;gt;[^\"]+)\"&lt;/P&gt;&lt;P&gt;Also, How can i get new fields named cluster_namespace=&amp;nbsp;&lt;SPAN class=""&gt;openshift-logging and cluster_podname=elasticsearch-im-infra from below field? considering "/" as a separator here&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;object=&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;openshift-logging/elasticsearch-im-infra&lt;/SPAN&gt;&lt;SPAN&gt;"&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Dec 2021 08:17:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579555#M47446</guid>
      <dc:creator>karthiklen</dc:creator>
      <dc:date>2021-12-30T08:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579557#M47447</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/241817"&gt;@karthiklen&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;if you're interested to maintain the object field, you could use something like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=log-135473-prod event.go NOT "l0.ms.com" 
| rex field=_raw ^\&amp;lt;\d+\&amp;gt;(?&amp;lt;last_seen&amp;gt;\w+\s+\d+\s+\d+:\d+:\d+).*namespace_name\=(?&amp;lt;namespace_name&amp;gt;[^,]+),\s+container_name\=(?&amp;lt;container_name&amp;gt;[^,]+),\s+pod_name\=(?&amp;lt;pod_name&amp;gt;[^,]+),\s+message\=(?&amp;lt;message1&amp;gt;[^\]]+).*object\=\"(?&amp;lt;object&amp;gt;[^\"]+)\"\s+kind\=\"(?&amp;lt;kind&amp;gt;[^\"]+)\"\s+apiVersion\=\"(?&amp;lt;apiVersion&amp;gt;[^\"]+)\"\s+type\=\"(?&amp;lt;type&amp;gt;[^\"]+)\"\s+reason\=\"(?&amp;lt;reason&amp;gt;[^\"]+)\"\s+message\=\"(?&amp;lt;message2&amp;gt;[^\"]+)\"
| rex field=object "^(?&amp;lt;cluster_namespace&amp;gt;[^\/]+)\/(?&amp;lt;cluster_podname&amp;gt;.*)"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or, otherwise, if you want to use one single regex, you could use:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;^\&amp;lt;\d+\&amp;gt;(?&amp;lt;last_seen&amp;gt;\w+\s+\d+\s+\d+:\d+:\d+).*namespace_name\=(?&amp;lt;namespace_name&amp;gt;[^,]+),\s+container_name\=(?&amp;lt;container_name&amp;gt;[^,]+),\s+pod_name\=(?&amp;lt;pod_name&amp;gt;[^,]+),\s+message\=(?&amp;lt;message1&amp;gt;[^\]]+).*object\=\"(?&amp;lt;cluster_namespace&amp;gt;[^\/]+)\/(?&amp;lt;cluster_podname&amp;gt;[^\"]+)\"\s+kind\=\"(?&amp;lt;kind&amp;gt;[^\"]+)\"\s+apiVersion\=\"(?&amp;lt;apiVersion&amp;gt;[^\"]+)\"\s+type\=\"(?&amp;lt;type&amp;gt;[^\"]+)\"\s+reason\=\"(?&amp;lt;reason&amp;gt;[^\"]+)\"\s+message\=\"(?&amp;lt;message2&amp;gt;[^\"]+)\"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That you can test at &lt;A href="https://regex101.com/r/DyPs7h/1" target="_blank"&gt;https://regex101.com/r/DyPs7h/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Dec 2021 08:30:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579557#M47447</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2021-12-30T08:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579559#M47448</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;You can get those with this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults
| eval _raw="&amp;lt;135&amp;gt;Dec 30 06:59:07 9000n2.nodes.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-9000n2.nodes.com, message=I1230 06:58:56.139184 1 event.go:291] \"Event occurred\" object=\"openshift-logging/elasticsearch-im-infra\" kind=\"CronJob\" apiVersion=\"batch/v1beta1\" type=\"Warning\" reason=\"FailedNeedsStart\" message=\"Cannot determine if job needs to be started: too many missed start time (&amp;gt; 100). Set or decrease .spec.startingDeadlineSeconds or check clock skew\"
&amp;lt;135&amp;gt;Dec 30 06:59:07 9000n2.nodes.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-9000n2.nodes.com, message=I1230 06:58:56.133312 1 event.go:291] \"Event occurred\" object=\"openshift-logging/elasticsearch-im-audit\" kind=\"CronJob\" apiVersion=\"batch/v1beta1\" type=\"Warning\" reason=\"FailedNeedsStart\" message=\"Cannot determine if job needs to be started: too many missed start time (&amp;gt; 100). Set or decrease .spec.startingDeadlineSeconds or check clock skew\""
| multikv noheader=t
``` above generate sample data based on your example. You should change this to your base query```

| rex field=_raw "^\&amp;lt;\d+\&amp;gt;(?&amp;lt;last_seen&amp;gt;\w+\s+\d+\s+\d+:\d+:\d+).* namespace_name=(?&amp;lt;namespace_name&amp;gt;[^,]+),\s+container_name=(?&amp;lt;container_name&amp;gt;[^,]+),\s+pod_name=(?&amp;lt;pod_name&amp;gt;[^,]+),\s+message=(?&amp;lt;message1&amp;gt;[^\]]+).*object=\"(?&amp;lt;object&amp;gt;[^\"]+)\"\s+kind=\"(?&amp;lt;kind&amp;gt;[^\"]+)\"\s+apiVersion=\"(?&amp;lt;apiVersion&amp;gt;[^\"]+)\"\s+type=\"(?&amp;lt;type&amp;gt;[^\"]+)\"\s+reason=\"(?&amp;lt;reason&amp;gt;[^\"]+)\"\s+message=\"(?&amp;lt;message2&amp;gt;[^\"]+)\""
| rex field=object "(?&amp;lt;cluster_namespace&amp;gt;[^/]+)/(?&amp;lt;cluster_podname&amp;gt;(.*))"
| table namespace_name, last_seen, type, reason, object, cluster_namespace, cluster_podname,message1, message2&lt;/LI-CODE&gt;&lt;P&gt;r. Ismo&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Dec 2021 08:41:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579559#M47448</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2021-12-30T08:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579794#M47485</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;&amp;nbsp; Thanks a lot. It helped to filter out the following info(&lt;SPAN&gt;views into failed mounts and types of failures(views into failed mounts and types of failures&lt;/SPAN&gt;). However, im scratching my head to get the following info from the events, but not getting any clue to filter it out.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Realtime views around created/started containers/pod and failures&lt;/LI&gt;&lt;LI&gt;Realtime views on image pulls, success, backoffs, failures, denies&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;How can i attach the events list csv file here?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jan 2022 15:13:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579794#M47485</guid>
      <dc:creator>karthiklen</dc:creator>
      <dc:date>2022-01-03T15:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579795#M47486</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/241817"&gt;@karthiklen&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it isn't so easy to have a real time view taking logs from csv, maybe you should rethink the log ingestyion way!&lt;/P&gt;&lt;P&gt;Anyway, viewing your few events I cannot identify the creation/starting/failure events.&lt;/P&gt;&lt;P&gt;If you could share some events for each kind of event I could help you more.&lt;/P&gt;&lt;P&gt;Anyway, you could use the stats command to group events for each contaner/pod and use the eval to count only the ones for creation or failure events, so e.g. if the field where you can define the kind of event is "type": type=error for failures type=starting for start and so on, you could run something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=log-135473-prod event.go NOT "l0.ms.com" 
| rex field=_raw ^\&amp;lt;\d+\&amp;gt;(?&amp;lt;last_seen&amp;gt;\w+\s+\d+\s+\d+:\d+:\d+).*namespace_name\=(?&amp;lt;namespace_name&amp;gt;[^,]+),\s+container_name\=(?&amp;lt;container_name&amp;gt;[^,]+),\s+pod_name\=(?&amp;lt;pod_name&amp;gt;[^,]+),\s+message\=(?&amp;lt;message1&amp;gt;[^\]]+).*object\=\"(?&amp;lt;object&amp;gt;[^\"]+)\"\s+kind\=\"(?&amp;lt;kind&amp;gt;[^\"]+)\"\s+apiVersion\=\"(?&amp;lt;apiVersion&amp;gt;[^\"]+)\"\s+type\=\"(?&amp;lt;type&amp;gt;[^\"]+)\"\s+reason\=\"(?&amp;lt;reason&amp;gt;[^\"]+)\"\s+message\=\"(?&amp;lt;message2&amp;gt;[^\"]+)\"
| rex field=object "^(?&amp;lt;cluster_namespace&amp;gt;[^\/]+)\/(?&amp;lt;cluster_podname&amp;gt;.*)"
| stats count(eval(type="error")) AS failures count(eval(type="start")) AS startings BY container_name pod_name&lt;/LI-CODE&gt;&lt;P&gt;This is a sample to guide you.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jan 2022 15:24:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/579795#M47486</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-01-03T15:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580132#M47522</link>
      <description>&lt;P&gt;Here are some events with Failed/SuccessfulCreate. But the challenge is that we need to filter out and make a stats of the events 'Failed/SuccessfulCreate' of kind= Replicaset/statefulset/Deployment/Daemonset.&lt;/P&gt;&lt;P&gt;Attached the raw events from one of the kubernetes cluster.&amp;nbsp; The basic idea is get the stats of pod/containers failures/create statistics in splunk like we get from 'kubectl get events'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;135&amp;gt;Jan 6 10:39:26 control1.ai1-dev.dd.k8s.c0.ms.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-control1.ai1-dev.dd.k8s.c0.ms.com, message=I0106 10:38:56.512561 1 event.go:291] "Event occurred" object="clp-monitoring/loki-distributed-gateway-6bcfd9dc99" kind="ReplicaSet" apiVersion="apps/v1" type="Warning" reason="FailedCreate" message="Error creating: admission webhook \"endorse-validating-webhook.ai1-dev.dd.k8s.c0.ms.com\" denied the request: Denying image infra1.kod.ms.com:5000/nginxinc/nginx-unprivileged:1.19-alpine from unrecognized image registry infra1.kod.ms.com:5000."&lt;BR /&gt;&lt;BR /&gt;&amp;lt;135&amp;gt;Jan 6 10:39:26 control1.ai1-dev.dd.k8s.c0.ms.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-control1.ai1-dev.dd.k8s.c0.ms.com, message=I0106 10:38:56.500812 1 event.go:291] "Event occurred" object="loki-distributed/loki-loki-distributed-gateway-599d76c47c" kind="ReplicaSet" apiVersion="apps/v1" type="Warning" reason="FailedCreate" message="Error creating: pods \"loki-loki-distributed-gateway-599d76c47c-\" is forbidden: unable to validate against any security context constraint: [provider restricted: .spec.securityContext.fsGroup: Invalid value: []int64{1001160000}: 1001160000 is not an allowed group spec.containers[0].securityContext.runAsUser: Invalid value: 1001160000: must be in the ranges: [1001040000, 1001049999]]"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;lt;135&amp;gt;Jan 6 10:39:26 control1.ai1-dev.dd.k8s.c0.ms.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-control1.ai1-dev.dd.k8s.c0.ms.com, message=I0106 10:38:56.499675 1 event.go:291] "Event occurred" object="loki-distributed/loki-loki-distributed-distributor-c886b96fc" kind="ReplicaSet" apiVersion="apps/v1" type="Warning" reason="FailedCreate" message="Error creating: pods \"loki-loki-distributed-distributor-c886b96fc-\" is forbidden: unable to validate against any security context constraint: [provider restricted: .spec.securityContext.fsGroup: Invalid value: []int64{1001160000}: 1001160000 is not an allowed group spec.containers[0].securityContext.runAsUser: Invalid value: 1001160000: must be in the ranges: [1001040000, 1001049999]]"&lt;/P&gt;&lt;P&gt;&amp;lt;135&amp;gt;Jan 6 10:36:51 control1.app9.hz.k8s.c0.ms.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-control1.app9.hz.k8s.c0.ms.com, message=I0106 10:36:10.686055 1 event.go:291] "Event occurred" object="tigera-dex/tigera-dex-9d895b785" kind="ReplicaSet" apiVersion="apps/v1" type="Normal" reason="SuccessfulCreate" message="Created pod: tigera-dex-9d895b785-9jdgv"&lt;/P&gt;&lt;P&gt;&amp;lt;135&amp;gt;Jan 6 10:19:08 control3.stepping-stone1-dev.dd.k8s.c0.ms.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-control3.stepping-stone1-dev.dd.k8s.c0.ms.com, message=I0106 10:18:48.721499 1 event.go:291] "Event occurred" object="git-mirror/git-mirror-morgan-stanley-cloud-git-mirror-0" kind="Pod" apiVersion="v1" type="Warning" reason="FailedAttachVolume" message="AttachVolume.Attach failed for volume \"pvc-9361ced0-07fe-4212-9e7d-9efdc6369fd0\" : CSINode dd9002c17n1.nodes.c0.ms.com does not contain driver csi.trident.netapp.io"&lt;/P&gt;&lt;P&gt;&amp;lt;135&amp;gt;Jan 6 14:04:23 control3.ai2-dev.dd.k8s.c0.ms.com fluentd: docker:{"container_id"=&amp;gt;"cd60f994892219216651d53275d0eb4a1d1fee53cfd6f4ba50c48711297ee0d3"} kubernetes:{"container_name"=&amp;gt;"kube-controller-manager", "namespace_name"=&amp;gt;"openshift-kube-controller-manager", "pod_name"=&amp;gt;"kube-controller-manager-control3.ai2-dev.dd.k8s.c0.ms.com", "pod_id"=&amp;gt;"8429ce46-b305-4691-9258-98a7acb24e39", "host"=&amp;gt;"control3.ai2-dev.dd.k8s.c0.ms.com", "master_url"=&amp;gt;"&lt;A href="https://kubernetes.default.svc" target="_blank"&gt;https://kubernetes.default.svc&lt;/A&gt;", "namespace_id"=&amp;gt;"13d0f6f3-67a7-4f90-90b5-20f0311a4c9c", "namespace_labels"=&amp;gt;{"openshift_io/cluster-monitoring"=&amp;gt;"true", "openshift_io/run-level"=&amp;gt;"0"}, :flat_labels=&amp;gt;["app=kube-controller-manager", "kube-controller-manager=true", "revision=15"]} message:I0106 14:04:21.415065 1 event.go:291] "Event occurred" object="cps/prometheus-xiaomin-test-o11y-prometheus-server-6c65f45c79" kind="ReplicaSet" apiVersion="apps/v1" type="Warning" reason="FailedCreate" message="Error creating: pods \"prometheus-xiaomin-test-o11y-prometheus-server-6c65f45c79-\" is forbidden: unable to validate against any security context constraint: [provider restricted: .spec.securityContext.fsGroup: Invalid value: []int64{65534}: 65534 is not an allowed group pod.metadata.annotations.seccomp.security.alpha.kubernetes.io/pod: Forbidden: seccomp may not be set spec.containers[0].securityContext.runAsUser: Invalid value: 65535: must be in the ranges: [1000840000, 1000849999] pod.metadata.annotations.container.seccomp.security.alpha.kubernetes.io/o11y-prometheus-server: Forbidden: seccomp may not be set]" level:unknown hostname:control3.ai2-dev.dd.k8s.c0.ms.com pipeline_metadata:{"collector"=&amp;gt;{"ipaddr4"=&amp;gt;"10.85.166.220", "inputname"=&amp;gt;"fluent-plugin-systemd", "name"=&amp;gt;"fluentd", "received_at"=&amp;gt;"2022-01-06T14:04:22.323401+00:00", "version"=&amp;gt;"1.7.4 1.6.0"}} @timestamp:2022-01-06T14:04:21.415092+00:00 viaq_index_name:infra-write viaq_msg_id:ZThjZjliMzYtZWY4NS00N2FmLWE5MTgtOGRmMTY4NWQ1MmMw&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jan 2022 15:11:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580132#M47522</guid>
      <dc:creator>karthiklen</dc:creator>
      <dc:date>2022-01-06T15:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580396#M47543</link>
      <description>&lt;P&gt;Appreciate any suggestions on this please.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jan 2022 05:37:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580396#M47543</guid>
      <dc:creator>karthiklen</dc:creator>
      <dc:date>2022-01-10T05:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580407#M47545</link>
      <description>&lt;P&gt;I'm not sure if this is suitable, but you could try this.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults
| eval _raw="&amp;lt;135&amp;gt;Jan 6 10:39:26 control1.ai1-dev.dd.k8s.c0.ms.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-control1.ai1-dev.dd.k8s.c0.ms.com, message=I0106 10:38:56.512561 1 event.go:291] \"Event occurred\" object=\"clp-monitoring/loki-distributed-gateway-6bcfd9dc99\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Warning\" reason=\"FailedCreate\" message=\"Error creating: admission webhook \\\"endorse-validating-webhook.ai1-dev.dd.k8s.c0.ms.com\\\" denied the request: Denying image infra1.kod.ms.com:5000/nginxinc/nginx-unprivileged:1.19-alpine from unrecognized image registry infra1.kod.ms.com:5000.\"
&amp;lt;135&amp;gt;Jan 6 10:39:26 control1.ai1-dev.dd.k8s.c0.ms.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-control1.ai1-dev.dd.k8s.c0.ms.com, message=I0106 10:38:56.500812 1 event.go:291] \"Event occurred\" object=\"loki-distributed/loki-loki-distributed-gateway-599d76c47c\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Warning\" reason=\"FailedCreate\" message=\"Error creating: pods \\\"loki-loki-distributed-gateway-599d76c47c-\\\" is forbidden: unable to validate against any security context constraint: [provider restricted: .spec.securityContext.fsGroup: Invalid value: []int64{1001160000}: 1001160000 is not an allowed group spec.containers[0].securityContext.runAsUser: Invalid value: 1001160000: must be in the ranges: [1001040000, 1001049999]]\"
&amp;lt;135&amp;gt;Jan 6 10:39:26 control1.ai1-dev.dd.k8s.c0.ms.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-control1.ai1-dev.dd.k8s.c0.ms.com, message=I0106 10:38:56.499675 1 event.go:291] \"Event occurred\" object=\"loki-distributed/loki-loki-distributed-distributor-c886b96fc\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Warning\" reason=\"FailedCreate\" message=\"Error creating: pods \\\"loki-loki-distributed-distributor-c886b96fc-\\\" is forbidden: unable to validate against any security context constraint: [provider restricted: .spec.securityContext.fsGroup: Invalid value: []int64{1001160000}: 1001160000 is not an allowed group spec.containers[0].securityContext.runAsUser: Invalid value: 1001160000: must be in the ranges: [1001040000, 1001049999]]\"
&amp;lt;135&amp;gt;Jan 6 10:36:51 control1.app9.hz.k8s.c0.ms.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-control1.app9.hz.k8s.c0.ms.com, message=I0106 10:36:10.686055 1 event.go:291] \"Event occurred\" object=\"tigera-dex/tigera-dex-9d895b785\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Normal\" reason=\"SuccessfulCreate\" message=\"Created pod: tigera-dex-9d895b785-9jdgv\"
&amp;lt;135&amp;gt;Jan 6 10:19:08 control3.stepping-stone1-dev.dd.k8s.c0.ms.com kubernetes.var.log.containers.ku: namespace_name=openshift-kube-controller-manager, container_name=kube-controller-manager, pod_name=kube-controller-manager-control3.stepping-stone1-dev.dd.k8s.c0.ms.com, message=I0106 10:18:48.721499 1 event.go:291] \"Event occurred\" object=\"git-mirror/git-mirror-morgan-stanley-cloud-git-mirror-0\" kind=\"Pod\" apiVersion=\"v1\" type=\"Warning\" reason=\"FailedAttachVolume\" message=\"AttachVolume.Attach failed for volume \\\"pvc-9361ced0-07fe-4212-9e7d-9efdc6369fd0\\\" : CSINode dd9002c17n1.nodes.c0.ms.com does not contain driver csi.trident.netapp.io\"
&amp;lt;135&amp;gt;Jan 6 14:04:23 control3.ai2-dev.dd.k8s.c0.ms.com fluentd: docker:{\"container_id\"=&amp;gt;\"cd60f994892219216651d53275d0eb4a1d1fee53cfd6f4ba50c48711297ee0d3\"} kubernetes:{\"container_name\"=&amp;gt;\"kube-controller-manager\", \"namespace_name\"=&amp;gt;\"openshift-kube-controller-manager\", \"pod_name\"=&amp;gt;\"kube-controller-manager-control3.ai2-dev.dd.k8s.c0.ms.com\", \"pod_id\"=&amp;gt;\"8429ce46-b305-4691-9258-98a7acb24e39\", \"host\"=&amp;gt;\"control3.ai2-dev.dd.k8s.c0.ms.com\", \"master_url\"=&amp;gt;\"https://kubernetes.default.svc\", \"namespace_id\"=&amp;gt;\"13d0f6f3-67a7-4f90-90b5-20f0311a4c9c\", \"namespace_labels\"=&amp;gt;{\"openshift_io/cluster-monitoring\"=&amp;gt;\"true\", \"openshift_io/run-level\"=&amp;gt;\"0\"}, :flat_labels=&amp;gt;[\"app=kube-controller-manager\", \"kube-controller-manager=true\", \"revision=15\"]} message:I0106 14:04:21.415065 1 event.go:291] \"Event occurred\" object=\"cps/prometheus-xiaomin-test-o11y-prometheus-server-6c65f45c79\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Warning\" reason=\"FailedCreate\" message=\"Error creating: pods \\\"prometheus-xiaomin-test-o11y-prometheus-server-6c65f45c79-\\\" is forbidden: unable to validate against any security context constraint: [provider restricted: .spec.securityContext.fsGroup: Invalid value: []int64{65534}: 65534 is not an allowed group pod.metadata.annotations.seccomp.security.alpha.kubernetes.io/pod: Forbidden: seccomp may not be set spec.containers[0].securityContext.runAsUser: Invalid value: 65535: must be in the ranges: [1000840000, 1000849999] pod.metadata.annotations.container.seccomp.security.alpha.kubernetes.io/o11y-prometheus-server: Forbidden: seccomp may not be set]\" level:unknown hostname:control3.ai2-dev.dd.k8s.c0.ms.com pipeline_metadata:{\"collector\"=&amp;gt;{\"ipaddr4\"=&amp;gt;\"10.85.166.220\", \"inputname\"=&amp;gt;\"fluent-plugin-systemd\", \"name\"=&amp;gt;\"fluentd\", \"received_at\"=&amp;gt;\"2022-01-06T14:04:22.323401+00:00\", \"version\"=&amp;gt;\"1.7.4 1.6.0\"}} @timestamp:2022-01-06T14:04:21.415092+00:00 viaq_index_name:infra-write viaq_msg_id:ZThjZjliMzYtZWY4NS00N2FmLWE5MTgtOGRmMTY4NWQ1MmMw"
| multikv noheader=t
| extract
| rex "^&amp;lt;\d+&amp;gt;(?&amp;lt;time&amp;gt;\w+\s+\d+\s+\d+:\d+:\d+)\s+(?&amp;lt;host&amp;gt;[^\s]+)"
| eval _time = strptime(time, "%b %e %H:%M:%S")
| fields - time Column*
| table _time host kind reason * _raw
``` Above makes test events ```
| stats count by kind reason&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe you should try some other way to ingest that data as&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;proposed. In splunkbase there seems to be at least two different apps/TAs to analyse and monitor k8s logs.&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jan 2022 07:07:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580407#M47545</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2022-01-10T07:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580557#M47553</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have already got each fields extracted. Now, i have challenges with filtering out exact events related to pod and make the stats of pod/containers failures/create statistics in splunk like we get from 'kubectl get events'.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;Do we have any&amp;nbsp;&lt;SPAN&gt;apps/TAs to analyze&amp;nbsp;and monitor k8s logs? All i need is a stats/table of events related to pod(with failures,created, imagepullbackoff, etc..) and of kind=Repliacaset/statefulset/deployment.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Attached the raw events from one of the kubernetes cluster.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 08:23:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580557#M47553</guid>
      <dc:creator>karthiklen</dc:creator>
      <dc:date>2022-01-11T08:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580558#M47554</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/241817"&gt;@karthiklen&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;search in apps.splunk.com the Apps and TAs for Azure, probably you'll find what you need.&lt;/P&gt;&lt;P&gt;E,g, there's the Microsoft Azure App for Splunk (&lt;A href="https://splunkbase.splunk.com/app/4882/" target="_blank"&gt;https://splunkbase.splunk.com/app/4882/&lt;/A&gt;) that should answer to your need, put attention to the requirements of this app especially in terms of add-ons to install and how to configure it.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 08:36:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580558#M47554</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-01-11T08:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580590#M47555</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just understand that my firm doesnt allow to install external apps to achieve this.&lt;/P&gt;&lt;P&gt;Shall i request for a search query in secure-splunk itself to achieve this? Like i explained earlier, Just need a stats for pod health from the events already present in splunk.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 12:13:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580590#M47555</guid>
      <dc:creator>karthiklen</dc:creator>
      <dc:date>2022-01-11T12:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580593#M47556</link>
      <description>Maybe you could download it to your own workstation and then look it and use it as a "source of your inspiration" ;-?</description>
      <pubDate>Tue, 11 Jan 2022 12:18:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580593#M47556</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2022-01-11T12:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: how to parse Events in splunk for more useful dashboard panels</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580594#M47557</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/241817"&gt;@karthiklen&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;even if you cannot install new apps or TAs, you can find in those apps the configurations and dashboards useful for your requirements, instead of to study Azure logs!&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 12:25:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/how-to-parse-Events-in-splunk-for-more-useful-dashboard-panels/m-p/580594#M47557</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-01-11T12:25:51Z</dc:date>
    </item>
  </channel>
</rss>

