Splunk Search

Create a stats line per host



We have a custom search that should alert when a critical host, that we have defined in the search, is missing. The issue we're having is that we haven't been alerted on some of the hosts not having logs because the last time they had any logs was an age ago. When I change earliest=-1d to earliest=-1y the hosts I want appear but the search takes a longer time. 

Is there a way to make it so for every host value specified, a stats line is created where I can fillnull the fields as appropriate?

Here is the search:

| tstats prestats=true count where index="*", (host="host01" OR host="host02" OR host="host_01" OR host="host_02") earliest=-1d latest=now by index, host, _time span=1h
| eval period=if(_time>relative_time(now(),"-1d"),"current","last")
| chart count over host by period
| eval missing=if(last>0 AND (isnull(current) OR current=0), 1, 0)
| where missing=1
| sort - current, missing
| rename current as still_logging, last as old_logs, missing as is_missing

Labels (3)
0 Karma

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to July and August Tech Talks, Office Hours, and Webinars!

Dive into our sizzling summer lineup for July and August Community Office Hours and Tech Talks. Scroll down to ...

Edge Processor Scaling, Energy & Manufacturing Use Cases, and More New Articles on ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Get More Out of Your Security Practice With a SIEM

Get More Out of Your Security Practice With a SIEMWednesday, July 31, 2024  |  11AM PT / 2PM ETREGISTER ...