Splunk Search

Searching indexes by Deployment Client Name

pmdba
Builder

In a network with up to 150 deployment clients (all UF), is there a way to search indexes for all data from a particular deployment client name or server class? I am trying to create dashboards and reports for classes of servers that support specific applications or computing environments. Our host names change periodically and I am trying to avoid maintaining long (and potentially inaccurate) static lists of server names in tags.

0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

If your hostnames change over time then you'll need to maintain the historic mapping deployment client name -> hostname, for example in a lookup. You can use this as a data source to build a search that can fill the lookup automatically:

| rest /services/deployment/server/clients | table clientName hostname

See http://blogs.splunk.com/2011/01/11/maintaining-state-of-the-union/ for maintaining such a lookup.
You could then use the lookup to load all the recent hostnames for a given deployment client name and use that in your search.
Note, an inputs.conf stanza can list any hostname, it does not need to match with the hostname given to the deployment server.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

If your hostnames change over time then you'll need to maintain the historic mapping deployment client name -> hostname, for example in a lookup. You can use this as a data source to build a search that can fill the lookup automatically:

| rest /services/deployment/server/clients | table clientName hostname

See http://blogs.splunk.com/2011/01/11/maintaining-state-of-the-union/ for maintaining such a lookup.
You could then use the lookup to load all the recent hostnames for a given deployment client name and use that in your search.
Note, an inputs.conf stanza can list any hostname, it does not need to match with the hostname given to the deployment server.

somesoni2
SplunkTrust
SplunkTrust

Give this a try.

|eventcount summarize=false index=* | table index | map maxsearches=1000 search="|metadata type=hosts index=$index$ | table host | eval index=\"$index$\""

This will give mapping of host with index on which they write/send data.

0 Karma
Get Updates on the Splunk Community!

Index This | I am a number, but when you add ‘G’ to me, I go away. What number am I?

March 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

What’s New in Splunk App for PCI Compliance 5.3.1?

The Splunk App for PCI Compliance allows customers to extend the power of their existing Splunk solution with ...

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...