You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

2394 lines
218 KiB

{
"algorithms": {
"GradientBoostingRegressor": {
"RMSE": 0,
"modelId": "",
"rSquared": 0,
"recommended": false
},
"LinearRegression": {
"RMSE": 0,
"modelId": "",
"rSquared": 0,
"recommended": false
},
"LogisticRegression": {
"accuracy": 0,
"f1_score": 0,
"modelId": "",
"precision": 0,
"recall": 0,
"recommended": false
},
"RandomForestRegressor": {
"RMSE": 0,
"modelId": "",
"rSquared": 0,
"recommended": false
}
},
"description": "",
"enabled": true,
"entity_rules": [
{
"rule_condition": "AND",
"rule_items": [
{
"field": "splunk_role",
"field_type": "info",
"rule_type": "matches",
"value": "enterprise_security"
}
]
}
],
"key": "da-itsi-cp-monitoring-splunk-splunk-es-os-metrics",
"kpis": [
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "avg",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": null,
"severity_color": "#B50101",
"severity_color_light": "#E5A6A6",
"severity_label": "critical",
"severity_label_localized": null,
"severity_value": 6.0,
"threshold_value": 0.0
},
{
"dynamic_param": null,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 20.0
},
{
"dynamic_param": null,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 40.0
},
{
"dynamic_param": null,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 60.0
},
{
"dynamic_param": null,
"severity_color": "#99D18B",
"severity_color_light": "#DCEFD7",
"severity_label": "normal",
"severity_label_localized": null,
"severity_value": 2.0,
"threshold_value": 80.0
}
]
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "30",
"alert_on": "both",
"alert_period": "1",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": 0.999,
"anomaly_detection_training_window": "-7d",
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics)`",
"base_search_id": null,
"base_search_metric": null,
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": false,
"entity_filter_field": "",
"entity_split_field": "",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": null,
"severity_color": "#B50101",
"severity_color_light": "#E5A6A6",
"severity_label": "critical",
"severity_label_localized": null,
"severity_value": 6.0,
"threshold_value": 0.0
},
{
"dynamic_param": null,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 20.0
},
{
"dynamic_param": null,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 40.0
},
{
"dynamic_param": null,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 60.0
},
{
"dynamic_param": null,
"severity_color": "#99D18B",
"severity_color_light": "#DCEFD7",
"severity_label": "normal",
"severity_label_localized": null,
"severity_value": 2.0,
"threshold_value": 80.0
}
]
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": false,
"key": "SHKPI-da-itsi-cp-monitoring-splunk-splunk-es-os-metrics",
"kpi_base_search": "",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": null,
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics)` | stats latest(health_score) AS aggregate",
"search_aggregate": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics)` | stats latest(health_score) AS aggregate",
"search_alert": "",
"search_alert_earliest": "15",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": null,
"search_occurrences": 1.0,
"search_time_compare": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics)` [| stats count | addinfo | eval search= \"earliest=\" + tostring(info_min_time-(info_max_time-info_min_time))+ \" latest=\" + tostring(info_max_time) |fields search] | addinfo | eval bucket=if(_time<info_max_time-((info_max_time-info_min_time)/2), \"last_window\", \"current_window\") | stats avg(health_score) AS aggregate BY bucket | reverse | delta aggregate AS window_delta | search bucket=current_window | eval window_direction=if(window_delta >0, \"increase\", if(window_delta < 0, \"decrease\", \"none\"))",
"search_time_series": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics)` | timechart avg(health_score) AS aggregate",
"search_time_series_aggregate": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics)` | timechart avg(health_score) AS aggregate",
"search_time_series_entities": "",
"search_type": "adhoc",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "aggregate",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#AED3E5",
"base_severity_color_light": "#E3F0F6",
"base_severity_label": "info",
"base_severity_value": 1.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#AED3E5",
"base_severity_color_light": "#E3F0F6",
"base_severity_label": "info",
"base_severity_value": 1.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "ServiceHealthScore",
"trending_ad": {
"sensitivity": 8
},
"type": "service_health",
"tz_offset": null,
"unit": "",
"urgency": 11.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "sum",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-cpu-memory",
"base_search_metric": "cpu-cores",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host",
"entity_statop": "latest",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c",
"kpi_base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(latest, cpu_cores, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c, true, true, true)` | eval kpi=\"CPU Cores\", urgency=\"0.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(latest, sum, cpu_cores, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c)`",
"search_alert": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(latest, cpu_cores, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c, true, true, true)` | eval kpi=\"CPU Cores\", urgency=\"0.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(latest, sum, cpu_cores, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(latest, sum, cpu_cores, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c)`",
"search_time_series": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(latest, cpu_cores, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c)`",
"search_time_series_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(latest, cpu_cores, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c)`",
"search_time_series_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a3897b91-fb32-43c0-bf0a-973bc54aeb9c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(latest, cpu_cores, \"host\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "cpu_cores",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "CPU Cores",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 0.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "max",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 104,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 104.5,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 85.0
},
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 90.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 95.0
}
]
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-cpu-memory",
"base_search_metric": "cpu-used",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 104,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 104.5,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 85.0
},
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 90.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 95.0
}
]
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d",
"kpi_base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, cpu_used, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d, true, true, true)` | eval kpi=\"CPU Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, cpu_used, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d)`",
"search_alert": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, cpu_used, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d, true, true, true)` | eval kpi=\"CPU Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, cpu_used, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, max, cpu_used, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d)`",
"search_time_series": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, cpu_used, \"host\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d)`",
"search_time_series_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, cpu_used, \"host\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d)`",
"search_time_series_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-49716b04-cb26-4022-848e-f7fbcec9042d entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, cpu_used, \"host\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "cpu_used",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "CPU Utilization",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "%",
"urgency": 8.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "max",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats",
"base_search_metric": "disk-read-i-o-avg",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host_fs",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789",
"kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, reads_ps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789, true, true, true)` | eval kpi=\"Disk Read I/O, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, reads_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789)`",
"search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, reads_ps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789, true, true, true)` | eval kpi=\"Disk Read I/O, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, reads_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, max, reads_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789)`",
"search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, reads_ps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789)`",
"search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, reads_ps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789)`",
"search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-8f95dae5-4044-44ba-9265-b11ca7e34789 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, reads_ps, \"host_fs\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "reads_ps",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Disk Read I/O, Avg",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "iops",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "sum",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats",
"base_search_metric": "disk-read-kbps",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host_fs",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe",
"kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, reads_kbps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe, true, true, true)` | eval kpi=\"Disk Read kpbs\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, sum, reads_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe)`",
"search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, reads_kbps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe, true, true, true)` | eval kpi=\"Disk Read kpbs\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, sum, reads_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, sum, reads_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe)`",
"search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, reads_kbps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe)`",
"search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, reads_kbps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe)`",
"search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-7bac85a6-7999-44d8-9d24-dd0d047d9ffe entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, reads_kbps, \"host_fs\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "reads_kbps",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Disk Read kpbs",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "sum",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 2572337.031,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-disk-space",
"base_search_metric": "disk-usage",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host_fs",
"entity_statop": "max",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 10930.4928333333,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c",
"kpi_base_search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, usage, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c, true, true, true)` | eval kpi=\"Disk Used\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, sum, usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c)`",
"search_alert": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, usage, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c, true, true, true)` | eval kpi=\"Disk Used\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, sum, usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(max, sum, usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c)`",
"search_time_series": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, usage, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c)`",
"search_time_series_aggregate": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, usage, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c)`",
"search_time_series_entities": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-e4704472-c90e-4953-a1a8-60d59235083c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(max, usage, \"host_fs\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "usage",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Disk Used",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "max",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 104,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 104.5,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 90.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 95.0
}
]
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-disk-space",
"base_search_metric": "disk-utilized",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host_fs",
"entity_statop": "max",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 104,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 104.5,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 90.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 95.0
}
]
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513",
"kpi_base_search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, pct_usage, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513, true, true, true)` | eval kpi=\"Disk Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, max, pct_usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513)`",
"search_alert": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, pct_usage, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513, true, true, true)` | eval kpi=\"Disk Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, max, pct_usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(max, max, pct_usage, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513)`",
"search_time_series": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, pct_usage, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513)`",
"search_time_series_aggregate": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, pct_usage, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513)`",
"search_time_series_entities": "index=_introspection sourcetype=splunk_disk_objects component=Partitions \n| eval free = if(isnotnull('data.available'), 'data.available', 'data.free') \n| eval filesystem = 'data.mount_point' \n| eval usage = round(('data.capacity' - free) / 1024, 2) \n| eval capacity = round('data.capacity' / 1024, 2) \n| eval pct_usage = (usage/capacity)*100 \n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-97ea49cd-c41f-48d9-ba5d-bc3a0c252513 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(max, pct_usage, \"host_fs\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "pct_usage",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Disk Utilization",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "%",
"urgency": 8.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "max",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats",
"base_search_metric": "disk-write-i-o-max",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host_fs",
"entity_statop": "max",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb",
"kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, writes_ps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb, true, true, true)` | eval kpi=\"Disk Write I/O, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, max, writes_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb)`",
"search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(max, writes_ps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb, true, true, true)` | eval kpi=\"Disk Write I/O, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(max, max, writes_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(max, max, writes_ps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb)`",
"search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, writes_ps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb)`",
"search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(max, writes_ps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb)`",
"search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-236af50c-c746-483c-a583-ccd1fe70c4cb entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(max, writes_ps, \"host_fs\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "writes_ps",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Disk Write I/O, Avg",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "iops",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "sum",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 5686614.93222541,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats",
"base_search_metric": "disk-writes-kbps",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host_fs",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 175502.929334934,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa",
"kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, writes_kbps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa, true, true, true)` | eval kpi=\"Disk Write kpbs\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, sum, writes_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa)`",
"search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, writes_kbps, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa, true, true, true)` | eval kpi=\"Disk Write kpbs\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, sum, writes_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, sum, writes_kbps, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa)`",
"search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, writes_kbps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa)`",
"search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, writes_kbps, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa)`",
"search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-3beb5c24-517c-412f-890a-32f4429d3aaa entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, writes_kbps, \"host_fs\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "writes_kbps",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Disk Write kpbs",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "sum",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 238617422.974,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-cpu-memory",
"base_search_metric": "memory-total",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host",
"entity_statop": "latest",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 531937.529877307,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c",
"kpi_base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(latest, mem, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c, true, true, true)` | eval kpi=\"Installed Memory\", urgency=\"0.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(latest, sum, mem, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c)`",
"search_alert": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(latest, mem, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c, true, true, true)` | eval kpi=\"Installed Memory\", urgency=\"0.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(latest, sum, mem, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(latest, sum, mem, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c)`",
"search_time_series": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(latest, mem, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c)`",
"search_time_series_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(latest, mem, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c)`",
"search_time_series_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-89883272-b596-4388-a9ec-753363c12e5c entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(latest, mem, \"host\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "mem",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Installed Memory",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "M",
"urgency": 0.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "max",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 104,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 104.5,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 80.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 95.0
}
]
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-cpu-memory",
"base_search_metric": "memory-used-pct",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 104,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 104.5,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 80.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 95.0
}
]
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b",
"kpi_base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, mem_pct, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b, true, true, true)` | eval kpi=\"Memory Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, mem_pct, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b)`",
"search_alert": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, mem_pct, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b, true, true, true)` | eval kpi=\"Memory Utilization\", urgency=\"8.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, max, mem_pct, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, max, mem_pct, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b)`",
"search_time_series": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, mem_pct, \"host\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b)`",
"search_time_series_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, mem_pct, \"host\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b)`",
"search_time_series_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-07fb1870-3703-43f6-820f-d39cf3f6b13b entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, mem_pct, \"host\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "mem_pct",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Memory Utilization",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "%",
"urgency": 8.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "avg",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 4,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 4.4,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 1.0
},
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 2.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 3.0
},
{
"dynamic_param": 0.0,
"severity_color": "#B50101",
"severity_color_light": "#E5A6A6",
"severity_label": "critical",
"severity_label_localized": null,
"severity_value": 6.0,
"threshold_value": 4.0
}
]
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-cpu-memory",
"base_search_metric": "cpu-load",
"cohesive_ad": {},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": null,
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 4,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 4.4,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 1.0
},
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 2.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 3.0
},
{
"dynamic_param": 0.0,
"severity_color": "#B50101",
"severity_color_light": "#E5A6A6",
"severity_label": "critical",
"severity_label_localized": null,
"severity_value": 6.0,
"threshold_value": 4.0
}
]
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23",
"kpi_base_search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": null,
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, normalized_load_1m, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23, true, true, true)` | eval kpi=\"CPU Normalized Load\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, normalized_load_1m, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23)`",
"search_alert": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, normalized_load_1m, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23, true, true, true)` | eval kpi=\"CPU Normalized Load\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": null,
"search_buckets": "",
"search_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, normalized_load_1m, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, avg, normalized_load_1m, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23)`",
"search_time_series": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, normalized_load_1m, \"host\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23)`",
"search_time_series_aggregate": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, normalized_load_1m, \"host\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23)`",
"search_time_series_entities": "index=_introspection component=Hostwide \n| rename data.mem_used AS mem_used, data.mem AS mem, data.cpu_count as cpu_cores, data.cpu_idle_pct as cpu_idle_pct, data.normalized_load_avg_1min as normalized_load_1m\n| eval mem_pct = (mem_used/mem)*100, cpu_used = 100-cpu_idle_pct | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-a1f7e1ac-96a6-499c-abd7-c9395b213d23 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, normalized_load_1m, \"host\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "normalized_load_1m",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "CPU Normalized Load",
"trending_ad": {},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "avg",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats",
"base_search_metric": "io-service-time-avg",
"cohesive_ad": {},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": null,
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host_fs",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504",
"kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": null,
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, avg_service_ms, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504, true, true, true)` | eval kpi=\"IO Service Time, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, avg_service_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504)`",
"search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, avg_service_ms, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504, true, true, true)` | eval kpi=\"IO Service Time, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": null,
"search_buckets": "",
"search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, avg_service_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, avg, avg_service_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504)`",
"search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, avg_service_ms, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504)`",
"search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, avg_service_ms, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504)`",
"search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-c517c1dc-77ae-4fd0-ae63-eb4dabf7a504 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, avg_service_ms, \"host_fs\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "avg_service_ms",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "IO Service Time, Avg",
"trending_ad": {},
"type": "kpis_primary",
"tz_offset": null,
"unit": "ms",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "avg",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-splunk-introspection-iostats",
"base_search_metric": "io-wait-time-avg",
"cohesive_ad": {},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": null,
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host_fs",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": true,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239",
"kpi_base_search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ]",
"kpi_template_kpi_id": null,
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, avg_wait_ms, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239, true, true, true)` | eval kpi=\"IO Wait Time, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, avg_wait_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239)`",
"search_alert": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity(avg, avg_wait_ms, \"host_fs\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host_fs, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239, true, true, true)` | eval kpi=\"IO Wait Time, Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-es-os-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": null,
"search_buckets": "",
"search_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_single_value(avg, avg, avg_wait_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_and_compare(avg, avg, avg_wait_ms, \"host_fs\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239)`",
"search_time_series": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, avg_wait_ms, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239)`",
"search_time_series_aggregate": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_entity_time_series(avg, avg_wait_ms, \"host_fs\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-es-os-metrics, da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239)`",
"search_time_series_entities": "index=_introspection sourcetype=splunk_resource_usage component=IOStats \n| eval filesystem = 'data.mount_point'\n| eval reads_kbps = 'data.reads_kb_ps'\n| eval writes_kbps = 'data.writes_kb_ps'\n| eval reads_ps = 'data.reads_ps' \n| eval writes_ps = 'data.writes_ps'\n| eval io_ps = reads_ps + writes_ps\n| eval avg_service_ms = 'data.avg_service_ms'\n| eval avg_wait_ms = 'data.avg_total_ms'\n| eval cpu_pct = 'data.cpu_pct'\n| eval host_fs = host.\":\".filesystem | search [ | rest splunk_server=local report_as=text service_id=da-itsi-cp-monitoring-splunk-splunk-es-os-metrics kpi_id=da-itsi-cp-monitoring-splunk-28d930d0-f2ac-49bc-be39-19702e781239 entity_id_fields=host entity_alias_filtering_fields=host search_type=adhoc \"/servicesNS/nobody/SA-ITOA/itoa_interface/generate_entity_filter\" | return $value ] | `aggregate_raw_into_limited_entity_time_series(avg, avg_wait_ms, \"host_fs\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ES OS Metrics",
"threshold_eval": "",
"threshold_field": "avg_wait_ms",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "IO Wait Time, Avg",
"trending_ad": {},
"type": "kpis_primary",
"tz_offset": null,
"unit": "ms",
"urgency": 5.0,
"use_time_policies": false
}
],
"service_tags": {
"tags": [],
"template_tags": []
},
"service_template_id": "da-itsi-cp-monitoring-splunk-splunk-os-metrics-template",
"services_depending_on_me": [
{
"kpis_depending_on": [
"SHKPI-da-itsi-cp-monitoring-splunk-splunk-es-os-metrics"
],
"service_id": "da-itsi-cp-monitoring-splunk-splunk-enterprise-security"
}
],
"services_depends_on": [],
"team_id": "default_itsi_security_group",
"title": "Splunk ES OS Metrics",
"version": "0.0.38"
}