Monitoring Splunk

hosts not reporting

raiqb01
Engager

I have following search. how can I add indexes information in the results:

|tstats max(_time) as _time, where index=windows by host,index
|append [|metadata type=hosts index=win index=linux  ]
| eval now=now() | eval diff= now - lastTime | search diff > 18000 | eval notreportingsince=tostring(diff,"duration")
| table host lastTime notreportingsince | convert ctime(lastTime) as lastTime
| table host notreportingsince lastTime,index

 

 

Labels (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Try something like this

|tstats max(_time) as _time, where index=windows [|metadata type=hosts index=win index=linux 
| eval now=now() | eval diff= now - lastTime | where diff > 18000 | table host ] by host,index

View solution in original post

0 Karma

raiqb01
Engager

hi @ITWhisperer , I just need a list of hosts which are not reporting since last 5 days along with index information.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try something like this

|tstats max(_time) as _time, where index=windows [|metadata type=hosts index=win index=linux 
| eval now=now() | eval diff= now - lastTime | where diff > 18000 | table host ] by host,index
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What is it that you are trying to achieve that metadata is not giving you?

0 Karma
Get Updates on the Splunk Community!

New Case Study Shows the Value of Partnering with Splunk Academic Alliance

The University of Nevada, Las Vegas (UNLV) is another premier research institution helping to shape the next ...

How to Monitor Google Kubernetes Engine (GKE)

We’ve looked at how to integrate Kubernetes environments with Splunk Observability Cloud, but what about ...

Index This | How can you make 45 using only 4?

October 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...