Splunk Search

Searching indexes by Deployment Client Name

pmdba
Builder

In a network with up to 150 deployment clients (all UF), is there a way to search indexes for all data from a particular deployment client name or server class? I am trying to create dashboards and reports for classes of servers that support specific applications or computing environments. Our host names change periodically and I am trying to avoid maintaining long (and potentially inaccurate) static lists of server names in tags.

0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

If your hostnames change over time then you'll need to maintain the historic mapping deployment client name -> hostname, for example in a lookup. You can use this as a data source to build a search that can fill the lookup automatically:

| rest /services/deployment/server/clients | table clientName hostname

See http://blogs.splunk.com/2011/01/11/maintaining-state-of-the-union/ for maintaining such a lookup.
You could then use the lookup to load all the recent hostnames for a given deployment client name and use that in your search.
Note, an inputs.conf stanza can list any hostname, it does not need to match with the hostname given to the deployment server.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

If your hostnames change over time then you'll need to maintain the historic mapping deployment client name -> hostname, for example in a lookup. You can use this as a data source to build a search that can fill the lookup automatically:

| rest /services/deployment/server/clients | table clientName hostname

See http://blogs.splunk.com/2011/01/11/maintaining-state-of-the-union/ for maintaining such a lookup.
You could then use the lookup to load all the recent hostnames for a given deployment client name and use that in your search.
Note, an inputs.conf stanza can list any hostname, it does not need to match with the hostname given to the deployment server.

somesoni2
Revered Legend

Give this a try.

|eventcount summarize=false index=* | table index | map maxsearches=1000 search="|metadata type=hosts index=$index$ | table host | eval index=\"$index$\""

This will give mapping of host with index on which they write/send data.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...