{ "algorithms": { "GradientBoostingRegressor": { "RMSE": 0, "modelId": "", "rSquared": 0, "recommended": false }, "LinearRegression": { "RMSE": 0, "modelId": "", "rSquared": 0, "recommended": false }, "LogisticRegression": { "accuracy": 0, "f1_score": 0, "modelId": "", "precision": 0, "recall": 0, "recommended": false }, "RandomForestRegressor": { "RMSE": 0, "modelId": "", "rSquared": 0, "recommended": false } }, "description": "", "enabled": true, "entity_rules": [ { "rule_condition": "AND", "rule_items": [ { "field": "splunk_role", "field_type": "info", "rule_type": "matches", "value": "mgmt_console" } ] } ], "key": "da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics", "kpis": [ { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "avg", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": null, "severity_color": "#B50101", "severity_color_light": "#E5A6A6", "severity_label": "critical", "severity_label_localized": null, "severity_value": 6.0, "threshold_value": 0.0 }, { "dynamic_param": null, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 20.0 }, { "dynamic_param": null, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 40.0 }, { "dynamic_param": null, "severity_color": "#FFE98C", "severity_color_light": "#FFF4C5", "severity_label": "low", "severity_label_localized": null, "severity_value": 3.0, "threshold_value": 60.0 }, { "dynamic_param": null, "severity_color": "#99D18B", "severity_color_light": "#DCEFD7", "severity_label": "normal", "severity_label_localized": null, "severity_value": 2.0, "threshold_value": 80.0 } ] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "30", "alert_on": "both", "alert_period": "1", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": 0.999, "anomaly_detection_training_window": "-7d", "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics)`", "base_search_id": null, "base_search_metric": null, "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": false, "entity_filter_field": "", "entity_split_field": "", "entity_statop": "avg", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": null, "severity_color": "#B50101", "severity_color_light": "#E5A6A6", "severity_label": "critical", "severity_label_localized": null, "severity_value": 6.0, "threshold_value": 0.0 }, { "dynamic_param": null, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 20.0 }, { "dynamic_param": null, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 40.0 }, { "dynamic_param": null, "severity_color": "#FFE98C", "severity_color_light": "#FFF4C5", "severity_label": "low", "severity_label_localized": null, "severity_value": 3.0, "threshold_value": 60.0 }, { "dynamic_param": null, "severity_color": "#99D18B", "severity_color_light": "#DCEFD7", "severity_label": "normal", "severity_label_localized": null, "severity_value": 2.0, "threshold_value": 80.0 } ] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": false, "is_split_by_entity": false, "key": "SHKPI-da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics", "kpi_base_search": "", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": null, "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics)` | stats latest(health_score) AS aggregate", "search_aggregate": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics)` | stats latest(health_score) AS aggregate", "search_alert": "", "search_alert_earliest": "15", "search_alert_entities": "", "search_buckets": "", "search_entities": null, "search_occurrences": 1.0, "search_time_compare": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics)` [| stats count | addinfo | eval search= \"earliest=\" + tostring(info_min_time-(info_max_time-info_min_time))+ \" latest=\" + tostring(info_max_time) |fields search] | addinfo | eval bucket=if(_time0, \"increase\", if(window_delta < 0, \"decrease\", \"none\"))", "search_time_series": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics)` | timechart avg(health_score) AS aggregate", "search_time_series_aggregate": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics)` | timechart avg(health_score) AS aggregate", "search_time_series_entities": "", "search_type": "adhoc", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "aggregate", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#AED3E5", "base_severity_color_light": "#E3F0F6", "base_severity_label": "info", "base_severity_value": 1.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#AED3E5", "base_severity_color_light": "#E3F0F6", "base_severity_label": "info", "base_severity_value": 1.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "ServiceHealthScore", "trending_ad": { "sensitivity": 8 }, "type": "service_health", "tz_offset": null, "unit": "", "urgency": 11.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "sum", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-cpu-memory", "base_search_metric": "cpu-cores", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host", "entity_statop": "latest", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81", "kpi_base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(latest, cpu_cores, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81, true, true, true)` | eval kpi=\"CPU Cores\", urgency=\"0.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(latest, sum, cpu_cores, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81)`", "search_alert": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(latest, cpu_cores, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81, true, true, true)` | eval kpi=\"CPU Cores\", urgency=\"0.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(latest, sum, cpu_cores, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(latest, sum, cpu_cores, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81)`", "search_time_series": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(latest, cpu_cores, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81)`", "search_time_series_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(latest, cpu_cores, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81)`", "search_time_series_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-44ac71ce-087b-4f75-8248-e66be3d2ff81 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(latest, cpu_cores, \"host\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "cpu_cores", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "CPU Cores", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "", "urgency": 0.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "max", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 104, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 104.5, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": 0.0, "severity_color": "#FFE98C", "severity_color_light": "#FFF4C5", "severity_label": "low", "severity_label_localized": null, "severity_value": 3.0, "threshold_value": 85.0 }, { "dynamic_param": 0.0, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 90.0 }, { "dynamic_param": 0.0, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 95.0 } ] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-cpu-memory", "base_search_metric": "cpu-used", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host", "entity_statop": "avg", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 104, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 104.5, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": 0.0, "severity_color": "#FFE98C", "severity_color_light": "#FFF4C5", "severity_label": "low", "severity_label_localized": null, "severity_value": 3.0, "threshold_value": 85.0 }, { "dynamic_param": 0.0, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 90.0 }, { "dynamic_param": 0.0, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 95.0 } ] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add", "kpi_base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, cpu_used, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add, true, true, true)` | eval kpi=\"CPU Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, cpu_used, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add)`", "search_alert": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, cpu_used, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add, true, true, true)` | eval kpi=\"CPU Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, cpu_used, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, max, cpu_used, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add)`", "search_time_series": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, cpu_used, \"host\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add)`", "search_time_series_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, cpu_used, \"host\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add)`", "search_time_series_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-67bff78e-117a-4394-b4c4-9a4dfea13add entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, cpu_used, \"host\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "cpu_used", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "CPU Utilization", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "%", "urgency": 8.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "max", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats", "base_search_metric": "disk-read-i-o-avg", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host_fs", "entity_statop": "avg", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432", "kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, reads_ps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432, true, true, true)` | eval kpi=\"Disk Read I/O, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, reads_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432)`", "search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, reads_ps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432, true, true, true)` | eval kpi=\"Disk Read I/O, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, reads_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, max, reads_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432)`", "search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, reads_ps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432)`", "search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, reads_ps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432)`", "search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-491cc363-8f05-408b-9b40-41e6af082432 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, reads_ps, \"host_fs\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "reads_ps", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Disk Read I/O, Avg", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "iops", "urgency": 5.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "sum", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats", "base_search_metric": "disk-read-kbps", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host_fs", "entity_statop": "avg", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff", "kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, reads_kbps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff, true, true, true)` | eval kpi=\"Disk Read kpbs\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, sum, reads_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff)`", "search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, reads_kbps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff, true, true, true)` | eval kpi=\"Disk Read kpbs\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, sum, reads_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, sum, reads_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff)`", "search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, reads_kbps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff)`", "search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, reads_kbps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff)`", "search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-9b9bf18a-b100-4244-b954-dc2ff6c473ff entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, reads_kbps, \"host_fs\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "reads_kbps", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Disk Read kpbs", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "", "urgency": 5.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "sum", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 2572337.031, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-disk-space", "base_search_metric": "disk-usage", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host_fs", "entity_statop": "max", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 10930.4928333333, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1", "kpi_base_search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, usage, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1, true, true, true)` | eval kpi=\"Disk Used\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, sum, usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1)`", "search_alert": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, usage, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1, true, true, true)` | eval kpi=\"Disk Used\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, sum, usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(max, sum, usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1)`", "search_time_series": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, usage, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1)`", "search_time_series_aggregate": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, usage, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1)`", "search_time_series_entities": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-ac516cec-15f7-4307-afd3-6686722761f1 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(max, usage, \"host_fs\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "usage", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Disk Used", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "", "urgency": 5.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "max", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 104, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 104.5, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": 0.0, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 90.0 }, { "dynamic_param": 0.0, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 95.0 } ] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-disk-space", "base_search_metric": "disk-utilized", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host_fs", "entity_statop": "max", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 104, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 104.5, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": 0.0, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 90.0 }, { "dynamic_param": 0.0, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 95.0 } ] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725", "kpi_base_search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, pct_usage, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725, true, true, true)` | eval kpi=\"Disk Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, max, pct_usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725)`", "search_alert": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, pct_usage, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725, true, true, true)` | eval kpi=\"Disk Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, max, pct_usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(max, max, pct_usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725)`", "search_time_series": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, pct_usage, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725)`", "search_time_series_aggregate": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, pct_usage, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725)`", "search_time_series_entities": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-1e94d3fd-b6c1-4682-a386-8a7352971725 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(max, pct_usage, \"host_fs\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "pct_usage", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Disk Utilization", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "%", "urgency": 8.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "max", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats", "base_search_metric": "disk-write-i-o-max", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host_fs", "entity_statop": "max", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe", "kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, writes_ps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe, true, true, true)` | eval kpi=\"Disk Write I/O, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, max, writes_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe)`", "search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, writes_ps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe, true, true, true)` | eval kpi=\"Disk Write I/O, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, max, writes_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(max, max, writes_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe)`", "search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, writes_ps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe)`", "search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, writes_ps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe)`", "search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-eaecdbb8-b70e-429a-acc0-4ecd44f715fe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(max, writes_ps, \"host_fs\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "writes_ps", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Disk Write I/O, Avg", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "iops", "urgency": 5.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "sum", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 5686614.93222541, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats", "base_search_metric": "disk-writes-kbps", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host_fs", "entity_statop": "avg", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 175502.929334934, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024", "kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, writes_kbps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024, true, true, true)` | eval kpi=\"Disk Write kpbs\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, sum, writes_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024)`", "search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, writes_kbps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024, true, true, true)` | eval kpi=\"Disk Write kpbs\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, sum, writes_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, sum, writes_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024)`", "search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, writes_kbps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024)`", "search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, writes_kbps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024)`", "search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8e915606-eba4-4d1a-90cf-2ef5afbab024 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, writes_kbps, \"host_fs\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "writes_kbps", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Disk Write kpbs", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "", "urgency": 5.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "sum", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 238617422.974, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-cpu-memory", "base_search_metric": "memory-total", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host", "entity_statop": "latest", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 531937.529877307, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193", "kpi_base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(latest, mem, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193, true, true, true)` | eval kpi=\"Installed Memory\", urgency=\"0.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(latest, sum, mem, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193)`", "search_alert": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(latest, mem, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193, true, true, true)` | eval kpi=\"Installed Memory\", urgency=\"0.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(latest, sum, mem, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(latest, sum, mem, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193)`", "search_time_series": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(latest, mem, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193)`", "search_time_series_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(latest, mem, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193)`", "search_time_series_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-18b9ec52-f4c1-4767-bc4e-21e027acd193 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(latest, mem, \"host\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "mem", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Installed Memory", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "M", "urgency": 0.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "max", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 104, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 104.5, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": 0.0, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 80.0 }, { "dynamic_param": 0.0, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 95.0 } ] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-cpu-memory", "base_search_metric": "memory-used-pct", "cohesive_ad": { "sensitivity": 8 }, "cohesive_anomaly_detection_is_enabled": false, "datamodel": { "datamodel": "", "field": "", "object": "", "owner_field": "" }, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host", "entity_statop": "avg", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 104, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 104.5, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": 0.0, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 80.0 }, { "dynamic_param": 0.0, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 95.0 } ] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce", "kpi_base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": "", "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, mem_pct, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce, true, true, true)` | eval kpi=\"Memory Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, mem_pct, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce)`", "search_alert": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, mem_pct, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce, true, true, true)` | eval kpi=\"Memory Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": "", "search_buckets": "", "search_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, mem_pct, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, max, mem_pct, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce)`", "search_time_series": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, mem_pct, \"host\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce)`", "search_time_series_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, mem_pct, \"host\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce)`", "search_time_series_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-efb5e3ec-cca7-4448-82e4-4c78211a10ce entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, mem_pct, \"host\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "mem_pct", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "Memory Utilization", "trending_ad": { "sensitivity": 8 }, "type": "kpis_primary", "tz_offset": null, "unit": "%", "urgency": 8.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "avg", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 4, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 4.4, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": 0.0, "severity_color": "#FFE98C", "severity_color_light": "#FFF4C5", "severity_label": "low", "severity_label_localized": null, "severity_value": 3.0, "threshold_value": 1.0 }, { "dynamic_param": 0.0, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 2.0 }, { "dynamic_param": 0.0, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 3.0 }, { "dynamic_param": 0.0, "severity_color": "#B50101", "severity_color_light": "#E5A6A6", "severity_label": "critical", "severity_label_localized": null, "severity_value": 6.0, "threshold_value": 4.0 } ] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-cpu-memory", "base_search_metric": "cpu-load", "cohesive_ad": {}, "cohesive_anomaly_detection_is_enabled": false, "datamodel": null, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host", "entity_statop": "avg", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 4, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 4.4, "render_boundary_min": 0.0, "threshold_levels": [ { "dynamic_param": 0.0, "severity_color": "#FFE98C", "severity_color_light": "#FFF4C5", "severity_label": "low", "severity_label_localized": null, "severity_value": 3.0, "threshold_value": 1.0 }, { "dynamic_param": 0.0, "severity_color": "#FCB64E", "severity_color_light": "#FEE6C1", "severity_label": "medium", "severity_label_localized": null, "severity_value": 4.0, "threshold_value": 2.0 }, { "dynamic_param": 0.0, "severity_color": "#F26A35", "severity_color_light": "#FBCBB9", "severity_label": "high", "severity_label_localized": null, "severity_value": 5.0, "threshold_value": 3.0 }, { "dynamic_param": 0.0, "severity_color": "#B50101", "severity_color_light": "#E5A6A6", "severity_label": "critical", "severity_label_localized": null, "severity_value": 6.0, "threshold_value": 4.0 } ] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2", "kpi_base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": null, "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, normalized_load_1m, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2, true, true, true)` | eval kpi=\"CPU Normalized Load\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, normalized_load_1m, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2)`", "search_alert": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, normalized_load_1m, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2, true, true, true)` | eval kpi=\"CPU Normalized Load\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": null, "search_buckets": "", "search_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, normalized_load_1m, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, avg, normalized_load_1m, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2)`", "search_time_series": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, normalized_load_1m, \"host\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2)`", "search_time_series_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, normalized_load_1m, \"host\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2)`", "search_time_series_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-af4d8a0e-04d5-4ad6-9a06-7fb21f756ce2 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, normalized_load_1m, \"host\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "normalized_load_1m", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "CPU Normalized Load", "trending_ad": {}, "type": "kpis_primary", "tz_offset": null, "unit": "", "urgency": 5.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "avg", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats", "base_search_metric": "io-service-time-avg", "cohesive_ad": {}, "cohesive_anomaly_detection_is_enabled": false, "datamodel": null, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host_fs", "entity_statop": "avg", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae", "kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": null, "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, avg_service_ms, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae, true, true, true)` | eval kpi=\"IO Service Time, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, avg_service_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae)`", "search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, avg_service_ms, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae, true, true, true)` | eval kpi=\"IO Service Time, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": null, "search_buckets": "", "search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, avg_service_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, avg, avg_service_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae)`", "search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, avg_service_ms, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae)`", "search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, avg_service_ms, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae)`", "search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-77433c3d-1a76-41dc-9d01-ef9778588eae entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, avg_service_ms, \"host_fs\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "avg_service_ms", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "IO Service Time, Avg", "trending_ad": {}, "type": "kpis_primary", "tz_offset": null, "unit": "ms", "urgency": 5.0, "use_time_policies": false }, { "adaptive_thresholding_training_window": "-7d", "adaptive_thresholds_is_enabled": false, "aggregate_eval": "", "aggregate_statop": "avg", "aggregate_threshold_alert_enabled": false, "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "aggregate_thresholds_alert_enabled": false, "aggregate_thresholds_custom_alert_enabled": false, "aggregate_thresholds_custom_alert_rules": [], "alert_eval": "", "alert_lag": "5", "alert_on": "both", "alert_period": "5", "anomaly_detection_alerting_enabled": false, "anomaly_detection_is_enabled": false, "anomaly_detection_sensitivity": null, "anomaly_detection_training_window": null, "backfill_earliest_time": "-7d", "backfill_enabled": false, "base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem", "base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats", "base_search_metric": "io-wait-time-avg", "cohesive_ad": {}, "cohesive_anomaly_detection_is_enabled": false, "datamodel": null, "datamodel_filter": [], "datamodel_filter_clauses": null, "description": "", "enabled": true, "entity_filter_field": "host", "entity_split_field": "host_fs", "entity_statop": "avg", "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "fill_gaps": "null_value", "gap_custom_alert_value": 0.0, "gap_severity": "unknown", "gap_severity_color": "#CCCCCC", "gap_severity_color_light": "#EEEEEE", "gap_severity_value": "-1", "is_filter_entities_to_service": true, "is_split_by_entity": true, "key": "da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc", "kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]", "kpi_template_kpi_id": null, "kpi_threshold_template_id": "", "metric_qualifier": "", "metric_search_spec": { "metric_index": "", "metric_name": "" }, "search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, avg_wait_ms, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc, true, true, true)` | eval kpi=\"IO Wait Time, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, avg_wait_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc)`", "search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, avg_wait_ms, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc, true, true, true)` | eval kpi=\"IO Wait Time, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics\" | `assess_urgency` | `gettime`", "search_alert_earliest": "5", "search_alert_entities": null, "search_buckets": "", "search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, avg_wait_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc)`", "search_occurrences": 1.0, "search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, avg, avg_wait_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc)`", "search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, avg_wait_ms, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc)`", "search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, avg_wait_ms, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics, da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc)`", "search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-5fd45b8d-16e7-41ee-bf33-36258739a0bc entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, avg_wait_ms, \"host_fs\", 5)`", "search_type": "shared_base", "service_title": "Splunk Management Console OS Metrics", "threshold_eval": "", "threshold_field": "avg_wait_ms", "time_policies": { "policies": { "default_policy": { "aggregate_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "entity_thresholds": { "base_severity_color": "#99D18B", "base_severity_color_light": "#DCEFD7", "base_severity_label": "normal", "base_severity_value": 2.0, "gauge_max": 100, "gauge_min": 0, "is_max_static": false, "is_min_static": true, "metric_field": "count", "render_boundary_max": 100.0, "render_boundary_min": 0.0, "threshold_levels": [] }, "policy_type": "static", "time_blocks": [], "title": "Default" } } }, "title": "IO Wait Time, Avg", "trending_ad": {}, "type": "kpis_primary", "tz_offset": null, "unit": "ms", "urgency": 5.0, "use_time_policies": false } ], "service_tags": { "tags": [], "template_tags": [] }, "service_template_id": "da-itsi-cp-monitoring-splunk-splunk-os-metrics-template", "services_depending_on_me": [ { "kpis_depending_on": [ "SHKPI-da-itsi-cp-monitoring-splunk-splunk-management-console-os-metrics" ], "service_id": "da-itsi-cp-monitoring-splunk-splunk-management-console" } ], "services_depends_on": [], "team_id": "default_itsi_security_group", "title": "Splunk Management Console OS Metrics", "version": "0.0.38" }