{ "algorithms": { "GradientBoostingRegressor": { "RMSE": 0, "modelId": "", "rSquared": 0, "recommended": false }, "LinearRegression": { "RMSE": 0, "modelId": "", "rSquared": 0, "recommended": false }, "LogisticRegression": { "accuracy": 0, "f1_score": 0, "modelId": "", "precision": 0, "recall": 0, "recommended": false }, "RandomForestRegressor": { "RMSE": 0, "modelId": "", "rSquared": 0, "recommended": false } }, "description": "", "enabled": true, "entity_rules": [ { "rule_condition": "AND", "rule_items": [ { "field": "splunk_role", "field_type": "info", "rule_type": "matches", "value": "deployment_server" } ] } ], "key": "da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics", "kpis": [ { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "avg", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": null, "severity_color": "#B50101", "severity_color_light": "#E5A6A6", "severity_label": "critical", "severity_label_localized": null, "severity_value": 6.0, "threshold_value": 0.0 }, { "dynamic_param": null, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 20.0 }, { "dynamic_param": null, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 40.0 }, { "dynamic_param": null, "severity_color": "#FFE98C", "severity_color_light": "#FFF4C5", "severity_label": "low", "severity_label_localized": null, "severity_value": 3.0, "threshold_value": 60.0 }, { "dynamic_param": null, "severity_color": "#99D18B", "severity_color_light": "#DCEFD7", "severity_label": "normal", "severity_label_localized": null, "severity_value": 2.0, "threshold_value": 80.0 } ] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "30", "alert_on": "both", "alert_period": "1", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": 0.999, "anomaly_detection_training_window": "-7d", "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics)`", "base_search_id": null, "base_search_metric": null, "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": false, "entity_filter_field": "", "entity_split_field": "", "entity_statop": "avg", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": null, "severity_color": "#B50101", "severity_color_light": "#E5A6A6", "severity_label": "critical", "severity_label_localized": null, "severity_value": 6.0, "threshold_value": 0.0 }, { "dynamic_param": null, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 20.0 }, { "dynamic_param": null, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 40.0 }, { "dynamic_param": null, "severity_color": "#FFE98C", "severity_color_light": "#FFF4C5", "severity_label": "low", "severity_label_localized": null, "severity_value": 3.0, "threshold_value": 60.0 }, { "dynamic_param": null, "severity_color": "#99D18B", "severity_color_light": "#DCEFD7", "severity_label": "normal", "severity_label_localized": null, "severity_value": 2.0, "threshold_value": 80.0 } ] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": false, "is_split_by_entity": false, "key": "SHKPI-da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics", "kpi_base_search": "", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": null, "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics)` | stats latest(health_score) AS aggregate", "search_aggregate": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics)` | stats latest(health_score) AS aggregate", "search_alert": "", "search_alert_earliest": "15", "search_alert_entities": "", "search_buckets": "", "search_entities": null, "search_occurrences": 1.0, "search_time_compare": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics)` [| stats count | addinfo | eval search= \"earliest=\" + tostring(info_min_time-(info_max_time-info_min_time))+ \" latest=\" + tostring(info_max_time) |fields search] | addinfo | eval bucket=if(_time0, \"increase\", if(window_delta < 0, \"decrease\", \"none\"))", "search_time_series": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics)` | timechart avg(health_score) AS aggregate", "search_time_series_aggregate": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics)` | timechart avg(health_score) AS aggregate", "search_time_series_entities": "", "search_type": "adhoc", "service_title": "Splunk Deployment Server Instance Metrics", "threshold_eval": "", "threshold_field": "aggregate", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#AED3E5", "base_severity_color_light": "#E3F0F6", "base_severity_label": "info", "base_severity_value": 1.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#AED3E5", "base_severity_color_light": "#E3F0F6", "base_severity_label": "info", "base_severity_value": 1.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "ServiceHealthScore", "trending_ad": { "sensitivity": 8 }, "type": "service_health", "tz_offset": null, "unit": "", "urgency": 11.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "sum", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname)", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-splunkd-errors", "base_search_metric": "errors", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host", "entity_statop": "count", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c", "kpi_base_search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(count, _time, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c, true, true, true)` | eval kpi=\"Error Count\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(count, sum, _time, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c)`", "search_alert": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(count, _time, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c, true, true, true)` | eval kpi=\"Error Count\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(count, sum, _time, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c)`", "search_occurrences": 1.0, "search_time_compare": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(count, sum, _time, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c)`", "search_time_series": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(count, _time, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c)`", "search_time_series_aggregate": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(count, _time, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c)`", "search_time_series_entities": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-0392841a-7f4e-4dcd-b04e-7657c28c5f3c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(count, _time, \"host\", 5)`", "search_type": "shared_base", "service_title": "Splunk Deployment Server Instance Metrics", "threshold_eval": "", "threshold_field": "_time", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Error Count", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "", "urgency": 5.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "sum", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname)", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-splunkd-errors", "base_search_metric": "error-hosts", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host", "entity_statop": "dc", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2", "kpi_base_search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(dc, hostname, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2, true, true, true)` | eval kpi=\"Erroring Hosts\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(dc, sum, hostname, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2)`", "search_alert": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(dc, hostname, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2, true, true, true)` | eval kpi=\"Erroring Hosts\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(dc, sum, hostname, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2)`", "search_occurrences": 1.0, "search_time_compare": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(dc, sum, hostname, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2)`", "search_time_series": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(dc, hostname, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2)`", "search_time_series_aggregate": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(dc, hostname, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2)`", "search_time_series_entities": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-40f0d91c-28c2-457b-9eba-08e70064ceb2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(dc, hostname, \"host\", 5)`", "search_type": "shared_base", "service_title": "Splunk Deployment Server Instance Metrics", "threshold_eval": "", "threshold_field": "hostname", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Erroring Hosts", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "", "urgency": 5.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "dc", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 1, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": 0.0, "severity_color": "#FFE98C", "severity_color_light": "#FFF4C5", "severity_label": "low", "severity_label_localized": null, "severity_value": 3.0, "threshold_value": 1.1 } ] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "15", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "| rest count=0 /services/apps/local | search disabled=0 | dedup label, splunk_server | rename splunk_server as host | fields label, host | eventstats dc(label) as app_ct by host", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-installed-apps", "base_search_metric": "installed-apps", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host", "entity_statop": "count", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f", "kpi_base_search": "| rest count=0 /services/apps/local | search disabled=0 | dedup label, splunk_server | rename splunk_server as host | fields label, host | eventstats dc(label) as app_ct by host | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "| rest count=0 /services/apps/local | search disabled=0 | dedup label, splunk_server | rename splunk_server as host | fields label, host | eventstats dc(label) as app_ct by host | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(count, label, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `aggregate_entity_into_service(dc)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f, true, true, true)` | eval kpi=\"Installed Apps\", urgency=\"5.0\", alert_period=\"15\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "| rest count=0 /services/apps/local | search disabled=0 | dedup label, splunk_server | rename splunk_server as host | fields label, host | eventstats dc(label) as app_ct by host | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(count, dc, label, \"host\", 15)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f)`", "search_alert": "| rest count=0 /services/apps/local | search disabled=0 | dedup label, splunk_server | rename splunk_server as host | fields label, host | eventstats dc(label) as app_ct by host | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(count, label, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `aggregate_entity_into_service(dc)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f, true, true, true)` | eval kpi=\"Installed Apps\", urgency=\"5.0\", alert_period=\"15\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "15", "search_alert_entities": "", "search_buckets": "", "search_entities": "| rest count=0 /services/apps/local | search disabled=0 | dedup label, splunk_server | rename splunk_server as host | fields label, host | eventstats dc(label) as app_ct by host | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(count, dc, label, \"host\", 15)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f)`", "search_occurrences": 1.0, "search_time_compare": "| rest count=0 /services/apps/local | search disabled=0 | dedup label, splunk_server | rename splunk_server as host | fields label, host | eventstats dc(label) as app_ct by host | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(count, dc, label, \"host\", 15)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f)`", "search_time_series": "| rest count=0 /services/apps/local | search disabled=0 | dedup label, splunk_server | rename splunk_server as host | fields label, host | eventstats dc(label) as app_ct by host | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(count, label, \"host\", 15)` | `aggregate_entity_into_service_time_series(dc, 15)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f)`", "search_time_series_aggregate": "| rest count=0 /services/apps/local | search disabled=0 | dedup label, splunk_server | rename splunk_server as host | fields label, host | eventstats dc(label) as app_ct by host | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(count, label, \"host\", 15)` | `aggregate_entity_into_service_time_series(dc, 15)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f)`", "search_time_series_entities": "| rest count=0 /services/apps/local | search disabled=0 | dedup label, splunk_server | rename splunk_server as host | fields label, host | eventstats dc(label) as app_ct by host | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-1dd1be88-2df2-4a09-83e9-ddd632ae908f entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(count, label, \"host\", 15)`", "search_type": "shared_base", "service_title": "Splunk Deployment Server Instance Metrics", "threshold_eval": "", "threshold_field": "label", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Installed Apps", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "", "urgency": 5.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "sum", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 25173.6, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname)", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-splunkd-errors", "base_search_metric": "login-errors", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host", "entity_statop": "count", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 6173.1, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd", "kpi_base_search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(count, isLoginError, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd, true, true, true)` | eval kpi=\"Login Errors\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(count, sum, isLoginError, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd)`", "search_alert": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(count, isLoginError, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd, true, true, true)` | eval kpi=\"Login Errors\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(count, sum, isLoginError, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd)`", "search_occurrences": 1.0, "search_time_compare": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(count, sum, isLoginError, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd)`", "search_time_series": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(count, isLoginError, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd)`", "search_time_series_aggregate": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(count, isLoginError, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd)`", "search_time_series_entities": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-d0a02209-b125-4ff2-80b9-189421527fbd entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(count, isLoginError, \"host\", 5)`", "search_type": "shared_base", "service_title": "Splunk Deployment Server Instance Metrics", "threshold_eval": "", "threshold_field": "isLoginError", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Login Errors", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "", "urgency": 5.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "sum", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname)", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-splunkd-errors", "base_search_metric": "ssl-errors", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host", "entity_statop": "count", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501", "kpi_base_search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(count, isSSLerror, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501, true, true, true)` | eval kpi=\"SSL Errors\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(count, sum, isSSLerror, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501)`", "search_alert": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(count, isSSLerror, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501, true, true, true)` | eval kpi=\"SSL Errors\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(count, sum, isSSLerror, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501)`", "search_occurrences": 1.0, "search_time_compare": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(count, sum, isSSLerror, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501)`", "search_time_series": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(count, isSSLerror, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501)`", "search_time_series_aggregate": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(count, isSSLerror, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics, da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501)`", "search_time_series_entities": "index=_internal log_level=ERROR \n| rex field=message \"(?SSL)\"\n| eval isLoginError=if(component=\"UserManagerPro\" OR (component=\"UiAuth\" AND status=\"failure\"), 1, 0)\n| rex field=src \"^(?.*):\"\n| rex field=server \"^https://(?.*):.*$\"\n| eval src_ip=if(isnull(src_ip), server_ip, src_ip)\n| lookup dnslookup clientip as src_ip OUTPUT clienthost as src_host\n| rex field=src_host \"(?^[^.*]*)\"\n| eval hostname = if (isnull(hostname), host, hostname) | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics kpi_id=da-itsi-cp-monitoring-splunk-7c8c6ba0-bc62-44a5-a01e-3f2c44369501 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(count, isSSLerror, \"host\", 5)`", "search_type": "shared_base", "service_title": "Splunk Deployment Server Instance Metrics", "threshold_eval": "", "threshold_field": "isSSLerror", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "SSL Errors", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "", "urgency": 5.0, "use_time_policies": false } ], "service_tags": { "tags": [], "template_tags": [] }, "service_template_id": "da-itsi-cp-monitoring-splunk-splunk-instance-metrics-template", "services_depending_on_me": [ { "kpis_depending_on": [ "SHKPI-da-itsi-cp-monitoring-splunk-splunk-deployment-server-instance-metrics" ], "service_id": "da-itsi-cp-monitoring-splunk-splunk-deployment-server" } ], "services_depends_on": [], "team_id": "default_itsi_security_group", "title": "Splunk Deployment Server Instance Metrics", "version": "0.0.38" }