Splunk Search

Search SPL to show messages menu

awmorris
Path Finder

Can someone tell me the Splunk query to match the contents of the "Messages" menu item? As an example, i see the following message in my messages drop down from the menu but I want the Splunk query that shows the same:

"Search peer redacted.server.com has the following message: Indexer Clustering: Too many bucket replication errors to target peer=10.1.2.3:9887. Will stop streaming data from hot buckets to this target while errors persist. Check for network connectivity from the cluster peer reporting this issue to the replication port of target peer. If this condition persists, you can temporarily put that peer in manual detention."

0 Karma
1 Solution

niketn
Legend

Messages are created through Bulletin Message Knowledge Object. So Message REST API call can be used:

| rest /services/messages
| search eai:acl.app=* author=*
| table title message author severity timeCreated_iso updated

PS: Add additional filters i.e. App Name and author (for example author="system")

For the kind of bucket replication error you are interested in, I would say even _internal index should log the same

index=_internal sourcetype=splunkd log_level!=INFO "bucket replication"

Others might be able to assist you with exact query based on component. But you can try running above search and form your desired query based on _internal index.

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

View solution in original post

niketn
Legend

Messages are created through Bulletin Message Knowledge Object. So Message REST API call can be used:

| rest /services/messages
| search eai:acl.app=* author=*
| table title message author severity timeCreated_iso updated

PS: Add additional filters i.e. App Name and author (for example author="system")

For the kind of bucket replication error you are interested in, I would say even _internal index should log the same

index=_internal sourcetype=splunkd log_level!=INFO "bucket replication"

Others might be able to assist you with exact query based on component. But you can try running above search and form your desired query based on _internal index.

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

mportnoy_splunk
Splunk Employee
Splunk Employee

There is a typo above in the last SPL line - 'sourcetype' is spelled incorrectly...

0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...