All Apps and Add-ons

How to see recently released apps and add-ons on SplunkBase

tnesavich_splun
Splunk Employee
Splunk Employee

See accepted answer below for a search to show what apps and add-ons have recently been released on Splunkbase. It depends on the [Analysis Of SplunkBase Apps for Splunk][1] app and is intended as an example that will need to be modified (see line 11).

Please let me know if this is helpful or improvements you would suggest.

Thanks!

0 Karma
1 Solution

tnesavich_splun
Splunk Employee
Splunk Employee

SPL below depends on the Analysis Of SplunkBase Apps for Splunk app and is intended as an example that will need to be modified (see line 11).

    | inputlookup splunk_apps 
    | eval install_method=case('Install Method Single' == "simple", "Self Service", 'Install Method Distributed' == "appmgmt_phase", "Self Service", 1==1, "Needs Cloud Operations") 
    | search "App Name"="***" ("App Content"="*") Author="***" Description="***" (Platform="*") (Type="*") (Category="*") (Status="*") (Versions="*") (Product="*") install_method="*" 
    | where DLs >= 0 
    | where 'Rating Average' >= 3 AND 'Rating Count' >=3 
    | sort "App Name", Author, Description, Type, "App Content", Category, DLs, Status, Released, "Last Update", Versions, uid, Versions, Product, "Rating Average", "App Version", install_method 
    | eval DLs=tostring(DLs, "commas") 
    | rex field=uid mode=sed "s/(?<uid>^)/https:\/\/splunkbase.splunk.com\/app\//1"
    | rex field="Last Update" "^(?<yr>.*)-(?<mo>.*)-(?<dy>.*)T" 
    | eval "Last Update" = mo + "-" + dy + "-" + yr 
    | search yr=2019 mo=05 OR mo=06 
    | rename install_method AS "Splunk Cloud Installation Method", uid AS URL 
    | table "App Name", Author, Description, Type, Category,"Last Update", "App Version", Versions, URL, Product, "Rating Average", "Rating Count", "Splunk Cloud Installation Method" 
    | sort - "Last Update"

View solution in original post

0 Karma

tnesavich_splun
Splunk Employee
Splunk Employee

SPL below depends on the Analysis Of SplunkBase Apps for Splunk app and is intended as an example that will need to be modified (see line 11).

    | inputlookup splunk_apps 
    | eval install_method=case('Install Method Single' == "simple", "Self Service", 'Install Method Distributed' == "appmgmt_phase", "Self Service", 1==1, "Needs Cloud Operations") 
    | search "App Name"="***" ("App Content"="*") Author="***" Description="***" (Platform="*") (Type="*") (Category="*") (Status="*") (Versions="*") (Product="*") install_method="*" 
    | where DLs >= 0 
    | where 'Rating Average' >= 3 AND 'Rating Count' >=3 
    | sort "App Name", Author, Description, Type, "App Content", Category, DLs, Status, Released, "Last Update", Versions, uid, Versions, Product, "Rating Average", "App Version", install_method 
    | eval DLs=tostring(DLs, "commas") 
    | rex field=uid mode=sed "s/(?<uid>^)/https:\/\/splunkbase.splunk.com\/app\//1"
    | rex field="Last Update" "^(?<yr>.*)-(?<mo>.*)-(?<dy>.*)T" 
    | eval "Last Update" = mo + "-" + dy + "-" + yr 
    | search yr=2019 mo=05 OR mo=06 
    | rename install_method AS "Splunk Cloud Installation Method", uid AS URL 
    | table "App Name", Author, Description, Type, Category,"Last Update", "App Version", Versions, URL, Product, "Rating Average", "Rating Count", "Splunk Cloud Installation Method" 
    | sort - "Last Update"
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please re-write your post into a question and answer format. Then accept the answer. This will help future readers find your solution.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...