<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TriggerTime eval with SolarWinds Index in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/TriggerTime-eval-with-SolarWinds-Index/m-p/706680#M239125</link>
    <description>&lt;P&gt;I am creating a dashboard with Splunk to monitor offline assets in my environment with SolarWinds. I have the add-on and incorporate solarwinds:nodes and solarwinds:alerts into my query. I am running into an issue where I cant get the correct output for how long an asset has been down.&amp;nbsp; In SolarWinds you can see Trigger time in the Alert Status Overview. This shows the exact date and time the node went down.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cannot find a field from the raw data between both sourcetypes that will give me that output. I want to use eval to show how much time has passed since the trigger.&lt;/P&gt;&lt;P&gt;Does anyone know how to achieve this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 12 Dec 2024 18:49:21 GMT</pubDate>
    <dc:creator>daviswk</dc:creator>
    <dc:date>2024-12-12T18:49:21Z</dc:date>
    <item>
      <title>TriggerTime eval with SolarWinds Index</title>
      <link>https://community.splunk.com/t5/Splunk-Search/TriggerTime-eval-with-SolarWinds-Index/m-p/706680#M239125</link>
      <description>&lt;P&gt;I am creating a dashboard with Splunk to monitor offline assets in my environment with SolarWinds. I have the add-on and incorporate solarwinds:nodes and solarwinds:alerts into my query. I am running into an issue where I cant get the correct output for how long an asset has been down.&amp;nbsp; In SolarWinds you can see Trigger time in the Alert Status Overview. This shows the exact date and time the node went down.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cannot find a field from the raw data between both sourcetypes that will give me that output. I want to use eval to show how much time has passed since the trigger.&lt;/P&gt;&lt;P&gt;Does anyone know how to achieve this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 18:49:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/TriggerTime-eval-with-SolarWinds-Index/m-p/706680#M239125</guid>
      <dc:creator>daviswk</dc:creator>
      <dc:date>2024-12-12T18:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: TriggerTime eval with SolarWinds Index</title>
      <link>https://community.splunk.com/t5/Splunk-Search/TriggerTime-eval-with-SolarWinds-Index/m-p/706682#M239126</link>
      <description>&lt;P&gt;I'm not sure if I understand your question properly. Are you asking how to find a timestamp which is not included in the data you have? Well, if it's not there you need to make sure it's exported from the source somehow. It's more a Solarwinds question than a Splunk one.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 19:32:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/TriggerTime-eval-with-SolarWinds-Index/m-p/706682#M239126</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-12-12T19:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: TriggerTime eval with SolarWinds Index</title>
      <link>https://community.splunk.com/t5/Splunk-Search/TriggerTime-eval-with-SolarWinds-Index/m-p/706685#M239127</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;is correct if the data is not in the logs you can't eval from nothing.&lt;/P&gt;&lt;P&gt;That said one way we have combated down time in the past is calculating the duration since the last anything log entry from the host.&amp;nbsp; This is never really 100% because it could be a transport issue but the asset is still alive, or any number of other things where the asset is alive but not 'logging'.&amp;nbsp; However, any calculation of x&amp;gt;acceptable duration of the last log is always a good thing to know.&amp;nbsp; Pair that up with a good CMDB record to prevent tracking decommissioned assets.&lt;/P&gt;&lt;P&gt;There are many alternatives to lack of quality data, but they each come with pros and cons to be accounted for.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 20:39:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/TriggerTime-eval-with-SolarWinds-Index/m-p/706685#M239127</guid>
      <dc:creator>dural_yyz</dc:creator>
      <dc:date>2024-12-12T20:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: TriggerTime eval with SolarWinds Index</title>
      <link>https://community.splunk.com/t5/Splunk-Search/TriggerTime-eval-with-SolarWinds-Index/m-p/706686#M239128</link>
      <description>&lt;P&gt;Of course, checking when there are "missing" events is one of possible ways of checking uptime. But that's a completely different problem.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 20:45:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/TriggerTime-eval-with-SolarWinds-Index/m-p/706686#M239128</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-12-12T20:45:23Z</dc:date>
    </item>
  </channel>
</rss>

