Splunk Search

How to write a query required for checking all sourcetype which is configured for alert/report/dashboard

sanket4147
Loves-to-Learn Lots

Hi Team,

We are using Splunk Enterprise SIEM tool. we want to check all the source type which is configured for all alert/dashboard/report . As we have searched and tried with below query but it is not showing expected result which we want.

 

index="*" | stats count by source type

 

We want to check all source type which is configured under the all reports or all dashboards or all alerts.

if you can give me 3 different query for this then it is also fine we are not required all this in one query.

Could you please suggest and help us for this .

 

Regards,

Sanket Kaware 

 

 

 

 

 

Labels (2)
Tags (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

I'm not really sure what you want to achieve.

The fastest way to get metadata for events is... the metadata command 🙂 For example

| metadata type=sourcetypes index=*

Unfortunately, it will not break the data into separate indexes or hosts.

If you want to make statistics on your own, you can use tstats (don't use stats for it! tstats is way way faster than stats). For example

| tstats count where index=* by host

or

| tstats count where index=* by sources sourcetypes

 Don't forget to adjust your timerange picker!

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...