Splunk ITSI

ITSI KPI : Can I create query using join from two idexes

Joycetran
New Member

I need to create a KPI in service. This KPI is the percent between error and session. Error is count from index a, session is from index b, I need to join an create field as percent;
index=a | eval time_hour = strftime(_time, "%D-%H")|stats count as error| join time_hour [search index=b eventType="use" | eval time_hour = strftime(_time, "%D-%H") | stats count AS sessions ]|eval percent=error/session *100

It does not show the data in ITSI service. What should I change

Labels (2)
0 Karma

yannK
Splunk Employee
Splunk Employee

Does it work when you run it manually?

ITSI runs the KPI search as the role "splunk-system-user", check if that role has the permission to search the indexes A and B.

0 Karma

Joycetran
New Member

I have the admin access. If I run manually in search head, It works. When i bring to service to create KPI, It doesn't data. I dont know whether there is any rules or comment that cannot use in service KPI

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...