Is there a way of triggering an automated email alert whenever a NEW host(forwarder) starts sending logs to the Splunk Server.
Thanks Vlad.
One more way of doing this..
| metadata index=index* OR index=main type=hosts | eval age = now()-lastTime | where age < 432000| sort age d | convert ctime(lastTime) | fields age,host,lastTime
Above search returns new forwarders added in the last 5 days.
Thanks Vlad.
One more way of doing this..
| metadata index=index* OR index=main type=hosts | eval age = now()-lastTime | where age < 432000| sort age d | convert ctime(lastTime) | fields age,host,lastTime
Above search returns new forwarders added in the last 5 days.
Doesn't this show all forwarders that have logged in the past 5 days?
Maybe it's not a right way but I used some similar query for alarm to check if I "lost" some hosts
index=my_index host earliest=-5m latest=now | dedup host | eval StatusBefore=1 | join type=left host [search index=my_index host earliest=-65m latest=-60m | dedup host | eval StatusNow=1 ] | eval Status=if(StatusBefore=StatusNow,1,0) | table host, Status | where Status=0
This query do:
Depending on your data polling interval you can set your own periods.