Splunk Search

How to get dashboard not accessed by anyone in splunk

harishsplunk7
Explorer

I am want to get the list of dashboard which is not used by anyone for more than 90 days. i have tired to use the below query but didnt work well. 

| rest splunk_server=local "/servicesNS/-/-/data/ui/views"
| rename title as dashboard
| fields dashboard

| eval accessed=0
| search NOT
[ search index=_internal sourcetype=splunkd_ui_access earliest=-90d@d
| rex field=uri "/app/[^/]+/(?<dashboard>[^?/\s]+)"
| search NOT dashboard IN ("search", "home", "alert", "lookup_edit", "@go", "data_lab", "dataset", "datasets", "alerts", "dashboards", "reports")
| stats count as accessed by dashboard
| fields dashboard, accessed
]
| stats sum(accessed) as total_accessed by dashboard
| where total_accessed=0
| table dashboard

0 Karma
1 Solution

livehybrid
SplunkTrust
SplunkTrust

Ahhh sorry @harishsplunk7 - I misread!

I've rearranged the query a bit now, how does this look?

| rest splunk_server=local "/servicesNS/-/-/data/ui/views" 
| rename title as dashboard, eai:acl.app as app 
| fields dashboard app 
| eval isDashboard=1 
| append 
    [ search index=_internal sourcetype=splunkd_ui_access earliest=-90d@d uri="*/data/ui/views/*" 
    | rex field=uri "/servicesNS/(?<user>[^/]+)/(?<app>[^/]+)/data/ui/views/(?<dashboard>[^\.?/\s]+)" 
    | search NOT dashboard IN ("search", "home", "alert", "lookup_edit", "@go", "data_lab", "dataset", "datasets", "alerts", "dashboards", "reports") 
    | stats count as accessed by app, dashboard ] 
| stats sum(accessed) as accessed, values(isDashboard) as isDashboard by app, dashboard
| fillnull accessed value=0
| search isDashboard=1 accessed=0

Please let me know how you get on and consider accepting this answer or adding karma this answer if it has helped.
Regards

Will

View solution in original post

0 Karma

harishsplunk7
Explorer

Thank you for your response, but your query is providing list of dashboard accessed and i am looking for number of unused/not accessed by anyone. 

0 Karma

livehybrid
SplunkTrust
SplunkTrust

Ahhh sorry @harishsplunk7 - I misread!

I've rearranged the query a bit now, how does this look?

| rest splunk_server=local "/servicesNS/-/-/data/ui/views" 
| rename title as dashboard, eai:acl.app as app 
| fields dashboard app 
| eval isDashboard=1 
| append 
    [ search index=_internal sourcetype=splunkd_ui_access earliest=-90d@d uri="*/data/ui/views/*" 
    | rex field=uri "/servicesNS/(?<user>[^/]+)/(?<app>[^/]+)/data/ui/views/(?<dashboard>[^\.?/\s]+)" 
    | search NOT dashboard IN ("search", "home", "alert", "lookup_edit", "@go", "data_lab", "dataset", "datasets", "alerts", "dashboards", "reports") 
    | stats count as accessed by app, dashboard ] 
| stats sum(accessed) as accessed, values(isDashboard) as isDashboard by app, dashboard
| fillnull accessed value=0
| search isDashboard=1 accessed=0

Please let me know how you get on and consider accepting this answer or adding karma this answer if it has helped.
Regards

Will

0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @harishsplunk7 

I dont think your search covers Dashboard Studio dashboards, only Simple XML dashboards (but could be wrong)
Have a go with the following search and let me know how you get on!

index=_internal sourcetype=splunkd_ui_access earliest=-90d@d uri="*/data/ui/views/*"
| rex field=uri "/servicesNS/(?<user>[^/]+)/(?<app>[^/]+)/data/ui/views/(?<dashboard>[^\.?/\s]+)" 
| search NOT dashboard IN ("search", "home", "alert", "lookup_edit", "@go", "data_lab", "dataset", "datasets", "alerts", "dashboards", "reports") 
| stats count as accessed by app, dashboard 
| append 
    [| rest splunk_server=local "/servicesNS/-/-/data/ui/views" 
    | rename title as dashboard, eai:acl.app as app
    | fields dashboard app
    | eval isDashboard=1]
    | stats sum(accessed) as accessed, values(isDashboard) as isDashboard by app, dashboard
    | search isDashboard=1 accessed>0
0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...