Splunk Search

How do you include host IP address in the following Splunk search?

rbrisseyii
Explorer

Hello,

All our servers should have more than 2 apps installed. We run this report for a list of systems missing apps:

| rest /services/deployment/server/clients splunk_server=local| table hostname applications*.stateOnClient | untable hostname applications value | stats count by hostname | where count < 3

However, I would also like to include the host's IP address in this, but I can't figure out how to include it.

Any pointers or better ways to go about this?

Tags (1)
0 Karma
1 Solution

KailA
Contributor

Hey !
I think you just missed the ip field.

Can you try something like that

| rest /services/deployment/server/clients splunk_server=local 
| table hostname applications*.stateOnClient ip
| eval hostname = hostname."___".ip
| untable hostname applications value 
| stats count by hostname 
| where count < 3
| rex field=hostname "(?<hostname>.*)___(?<ip>.*)"

Let me know if it works for you.

Kail

View solution in original post

0 Karma

KailA
Contributor

Hey !
I think you just missed the ip field.

Can you try something like that

| rest /services/deployment/server/clients splunk_server=local 
| table hostname applications*.stateOnClient ip
| eval hostname = hostname."___".ip
| untable hostname applications value 
| stats count by hostname 
| where count < 3
| rex field=hostname "(?<hostname>.*)___(?<ip>.*)"

Let me know if it works for you.

Kail

0 Karma
Get Updates on the Splunk Community!

Good Sourcetype Naming

When it comes to getting data in, one of the earliest decisions made is what to use as a sourcetype. Often, ...

See your relevant APM services, dashboards, and alerts in one place with the updated ...

As a Splunk Observability user, you have a lot of data you have to manage, prioritize, and troubleshoot on a ...

Splunk App for Anomaly Detection End of Life Announcement

Q: What is happening to the Splunk App for Anomaly Detection?A: Splunk is officially announcing the ...