Splunk Search

Get metadata results as search events to associate an alert to hosts with older recentTime

mseguri
New Member

I need to obtain | metadata generated results as search events because I need to associate an alert to hosts with a too old recentTime.

What's the search corresponding to:

| metadata type=hosts index=_internal
0 Karma

abalogh_splunk
Splunk Employee
Splunk Employee

Hi,

There is an app for missing data / sourcetype. It's called Broken Hosts for Splunk.
It has some nice queries that you could reuse if you do not want to use the app itself.

Link: https://splunkbase.splunk.com/app/3247/

Good luck!

0 Karma

mseguri
New Member

Hello, I installed the application. It seems to suffer the same defect as my query: it returns statistic rows, not events. How can I attach an alert to it?

0 Karma

niketn
Legend

@mseguri, are you looking for something like the following addinfo example in Splunk Docs? https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Addinfo#2._Determine_which_heart...

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

richgalloway
SplunkTrust
SplunkTrust

This works for me. Replace the zero with your desired interval.

| metadata type=hosts index=_internal | where (now()-recentTime)>0 | fieldformat recentTime=strftime(recentTime,"%Y-%m-%d %H:%M:%S") | table host recentTime
---
If this reply helps you, Karma would be appreciated.
0 Karma

mseguri
New Member

@richgalloway I didn't try your query but it seems to not respond to my question. I need a query that returns search events. Yours just return results in a table. Thanks

0 Karma

richgalloway
SplunkTrust
SplunkTrust

If you want to create an alert for hosts with too old of a recentTime value, use the query I offered and set the alert to trigger if the number of events is not zero.
If you just want the events themselves then omit the table command.

---
If this reply helps you, Karma would be appreciated.
0 Karma

mseguri
New Member

@richgalloway The query you wrote is very similar to the one I wrote and that led me to open this question. Our query does not return events. It is not possible to attach any alert to it. It return results, not events. Alerts are based on events. The alert you suggest will never trigger. Is it clearer now?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I was able to create an alert using the above query. The key seemed to be setting the trigger to be "Number of Hosts" greater than zero rather than "Number of results".
Notice Splunk uses the term "results" rather than "events" in the trigger definition.

---
If this reply helps you, Karma would be appreciated.
0 Karma

mseguri
New Member

I tried "Number of hosts" with no success

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...