You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

1958 lines
140 KiB

{
"algorithms": {
"GradientBoostingRegressor": {
"RMSE": 0,
"modelId": "",
"rSquared": 0,
"recommended": false
},
"LinearRegression": {
"RMSE": 0,
"modelId": "",
"rSquared": 0,
"recommended": false
},
"LogisticRegression": {
"accuracy": 0,
"f1_score": 0,
"modelId": "",
"precision": 0,
"recall": 0,
"recommended": false
},
"RandomForestRegressor": {
"RMSE": 0,
"modelId": "",
"rSquared": 0,
"recommended": false
}
},
"description": "",
"enabled": true,
"entity_rules": [],
"key": "da-itsi-cp-monitoring-splunk-splunk-itsi-metrics",
"kpis": [
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "avg",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": null,
"severity_color": "#B50101",
"severity_color_light": "#E5A6A6",
"severity_label": "critical",
"severity_label_localized": null,
"severity_value": 6.0,
"threshold_value": 0.0
},
{
"dynamic_param": null,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 20.0
},
{
"dynamic_param": null,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 40.0
},
{
"dynamic_param": null,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 60.0
},
{
"dynamic_param": null,
"severity_color": "#99D18B",
"severity_color_light": "#DCEFD7",
"severity_label": "normal",
"severity_label_localized": null,
"severity_value": 2.0,
"threshold_value": 80.0
}
]
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "30",
"alert_on": "both",
"alert_period": "1",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": 0.999,
"anomaly_detection_training_window": "-7d",
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics)`",
"base_search_id": null,
"base_search_metric": null,
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": false,
"entity_filter_field": "",
"entity_split_field": "",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": null,
"severity_color": "#B50101",
"severity_color_light": "#E5A6A6",
"severity_label": "critical",
"severity_label_localized": null,
"severity_value": 6.0,
"threshold_value": 0.0
},
{
"dynamic_param": null,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 20.0
},
{
"dynamic_param": null,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 40.0
},
{
"dynamic_param": null,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 60.0
},
{
"dynamic_param": null,
"severity_color": "#99D18B",
"severity_color_light": "#DCEFD7",
"severity_label": "normal",
"severity_label_localized": null,
"severity_value": 2.0,
"threshold_value": 80.0
}
]
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": false,
"key": "SHKPI-da-itsi-cp-monitoring-splunk-splunk-itsi-metrics",
"kpi_base_search": "",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": null,
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics)` | stats latest(health_score) AS aggregate",
"search_aggregate": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics)` | stats latest(health_score) AS aggregate",
"search_alert": "",
"search_alert_earliest": "15",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": null,
"search_occurrences": 1.0,
"search_time_compare": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics)` [| stats count | addinfo | eval search= \"earliest=\" + tostring(info_min_time-(info_max_time-info_min_time))+ \" latest=\" + tostring(info_max_time) |fields search] | addinfo | eval bucket=if(_time<info_max_time-((info_max_time-info_min_time)/2), \"last_window\", \"current_window\") | stats avg(health_score) AS aggregate BY bucket | reverse | delta aggregate AS window_delta | search bucket=current_window | eval window_direction=if(window_delta >0, \"increase\", if(window_delta < 0, \"decrease\", \"none\"))",
"search_time_series": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics)` | timechart avg(health_score) AS aggregate",
"search_time_series_aggregate": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics)` | timechart avg(health_score) AS aggregate",
"search_time_series_entities": "",
"search_type": "adhoc",
"service_title": "Splunk ITSI Metrics",
"threshold_eval": "",
"threshold_field": "aggregate",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#AED3E5",
"base_severity_color_light": "#E3F0F6",
"base_severity_label": "info",
"base_severity_value": 1.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#AED3E5",
"base_severity_color_light": "#E3F0F6",
"base_severity_label": "info",
"base_severity_value": 1.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "ServiceHealthScore",
"trending_ad": {
"sensitivity": 8
},
"type": "service_health",
"tz_offset": null,
"unit": "",
"urgency": 11.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "latest",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 44,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 3772.9,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 10.0
},
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 20.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 40.0
}
]
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-itsi-index-status",
"base_search_metric": "index-lag",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "index",
"entity_statop": "latest",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 44,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 3779.0,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 10.0
},
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 20.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 40.0
}
]
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-a7d23da7f2dac91db59a2d85",
"kpi_base_search": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_entity(latest, lag, \"index\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(index, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(latest)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-a7d23da7f2dac91db59a2d85, true, true, true)` | eval kpi=\"Index Lag\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_single_value(latest, latest, lag, \"index\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-a7d23da7f2dac91db59a2d85)`",
"search_alert": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_entity(latest, lag, \"index\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(index, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(latest)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-a7d23da7f2dac91db59a2d85, true, true, true)` | eval kpi=\"Index Lag\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_single_value(latest, latest, lag, \"index\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-a7d23da7f2dac91db59a2d85)`",
"search_occurrences": 1.0,
"search_time_compare": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_and_compare(latest, latest, lag, \"index\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-a7d23da7f2dac91db59a2d85)`",
"search_time_series": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_entity_time_series(latest, lag, \"index\", 5)` | `aggregate_entity_into_service_time_series(latest, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-a7d23da7f2dac91db59a2d85)`",
"search_time_series_aggregate": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_entity_time_series(latest, lag, \"index\", 5)` | `aggregate_entity_into_service_time_series(latest, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-a7d23da7f2dac91db59a2d85)`",
"search_time_series_entities": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_limited_entity_time_series(latest, lag, \"index\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ITSI Metrics",
"threshold_eval": "",
"threshold_field": "lag",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Index Lag",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "sum",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 2393.7,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-itsi-index-status",
"base_search_metric": "index-events",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "index",
"entity_statop": "count",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 2363.3,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-9fc3828e8fb358e92be1cb33",
"kpi_base_search": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_entity(count, _time, \"index\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(index, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-9fc3828e8fb358e92be1cb33, true, true, true)` | eval kpi=\"Indexed Events\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_single_value(count, sum, _time, \"index\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-9fc3828e8fb358e92be1cb33)`",
"search_alert": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_entity(count, _time, \"index\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(index, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-9fc3828e8fb358e92be1cb33, true, true, true)` | eval kpi=\"Indexed Events\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_single_value(count, sum, _time, \"index\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-9fc3828e8fb358e92be1cb33)`",
"search_occurrences": 1.0,
"search_time_compare": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_and_compare(count, sum, _time, \"index\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-9fc3828e8fb358e92be1cb33)`",
"search_time_series": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_entity_time_series(count, _time, \"index\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-9fc3828e8fb358e92be1cb33)`",
"search_time_series_aggregate": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_entity_time_series(count, _time, \"index\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-9fc3828e8fb358e92be1cb33)`",
"search_time_series_entities": "| metasearch (index=itsi_*) | fields _time, index | eval lag=now()-_time | `aggregate_raw_into_limited_entity_time_series(count, _time, \"index\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ITSI Metrics",
"threshold_eval": "",
"threshold_field": "_time",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Indexed Events",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "sum",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 1,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 1.0
}
]
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "| rest splunk_server=local /services/search/jobs/\n| search label=itsi*\n| fields label isFailed\n| rename label as search_name",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-itsi-internal-searches",
"base_search_metric": "failed-searches",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "search_name",
"entity_statop": "sum",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-492fae82a124c45f7c69e7fe",
"kpi_base_search": "| rest splunk_server=local /services/search/jobs/\n| search label=itsi*\n| fields label isFailed\n| rename label as search_name",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "| rest splunk_server=local /services/search/jobs/\n| search label=itsi*\n| fields label isFailed\n| rename label as search_name | `aggregate_raw_into_entity(sum, isFailed, \"search_name\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(search_name, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-492fae82a124c45f7c69e7fe, true, true, true)` | eval kpi=\"ITSI Interal Search Failed\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "| rest splunk_server=local /services/search/jobs/\n| search label=itsi*\n| fields label isFailed\n| rename label as search_name | `aggregate_raw_into_single_value(sum, sum, isFailed, \"search_name\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-492fae82a124c45f7c69e7fe)`",
"search_alert": "| rest splunk_server=local /services/search/jobs/\n| search label=itsi*\n| fields label isFailed\n| rename label as search_name | `aggregate_raw_into_entity(sum, isFailed, \"search_name\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(search_name, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-492fae82a124c45f7c69e7fe, true, true, true)` | eval kpi=\"ITSI Interal Search Failed\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "| rest splunk_server=local /services/search/jobs/\n| search label=itsi*\n| fields label isFailed\n| rename label as search_name | `aggregate_raw_into_single_value(sum, sum, isFailed, \"search_name\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-492fae82a124c45f7c69e7fe)`",
"search_occurrences": 1.0,
"search_time_compare": "| rest splunk_server=local /services/search/jobs/\n| search label=itsi*\n| fields label isFailed\n| rename label as search_name | `aggregate_raw_and_compare(sum, sum, isFailed, \"search_name\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-492fae82a124c45f7c69e7fe)`",
"search_time_series": "| rest splunk_server=local /services/search/jobs/\n| search label=itsi*\n| fields label isFailed\n| rename label as search_name | `aggregate_raw_into_entity_time_series(sum, isFailed, \"search_name\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-492fae82a124c45f7c69e7fe)`",
"search_time_series_aggregate": "| rest splunk_server=local /services/search/jobs/\n| search label=itsi*\n| fields label isFailed\n| rename label as search_name | `aggregate_raw_into_entity_time_series(sum, isFailed, \"search_name\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-492fae82a124c45f7c69e7fe)`",
"search_time_series_entities": "| rest splunk_server=local /services/search/jobs/\n| search label=itsi*\n| fields label isFailed\n| rename label as search_name | `aggregate_raw_into_limited_entity_time_series(sum, isFailed, \"search_name\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ITSI Metrics",
"threshold_eval": "",
"threshold_field": "isFailed",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "ITSI Interal Search Failed",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "count",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 22,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 22.0,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 1.0
},
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 5.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 10.0
},
{
"dynamic_param": 0.0,
"severity_color": "#B50101",
"severity_color_light": "#E5A6A6",
"severity_label": "critical",
"severity_label_localized": null,
"severity_value": 6.0,
"threshold_value": 20.0
}
]
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0)",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-itsi-log-error-warning",
"base_search_metric": "errors",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": false,
"key": "da-itsi-cp-monitoring-splunk-bd7f636bb8ea59302ae9aa67",
"kpi_base_search": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0)",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_service(count, isError)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-bd7f636bb8ea59302ae9aa67, true, true, true)` | eval kpi=\"ITSI Log Errors\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_single_value(count, isError, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-bd7f636bb8ea59302ae9aa67)`",
"search_alert": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_service(count, isError)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-bd7f636bb8ea59302ae9aa67, true, true, true)` | eval kpi=\"ITSI Log Errors\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_single_value(count, isError, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-bd7f636bb8ea59302ae9aa67)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_and_compare(count, isError, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-bd7f636bb8ea59302ae9aa67)`",
"search_time_series": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_service_time_series( count, isError, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-bd7f636bb8ea59302ae9aa67)`",
"search_time_series_aggregate": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_service_time_series( count, isError, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-bd7f636bb8ea59302ae9aa67)`",
"search_time_series_entities": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_service_time_series( count, isError, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-bd7f636bb8ea59302ae9aa67)`",
"search_type": "shared_base",
"service_title": "Splunk ITSI Metrics",
"threshold_eval": "",
"threshold_field": "isError",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "ITSI Log Errors",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "count",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 11,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 11.0,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 1.0
},
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 10.0
}
]
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0)",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-itsi-log-error-warning",
"base_search_metric": "refresh-queue-data-count",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": false,
"key": "da-itsi-cp-monitoring-splunk-0af6f2d50dcbc4234e50940d",
"kpi_base_search": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0)",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_service(count, isWarning)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-0af6f2d50dcbc4234e50940d, true, true, true)` | eval kpi=\"ITSI Log Warnings\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_single_value(count, isWarning, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-0af6f2d50dcbc4234e50940d)`",
"search_alert": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_service(count, isWarning)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-0af6f2d50dcbc4234e50940d, true, true, true)` | eval kpi=\"ITSI Log Warnings\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_single_value(count, isWarning, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-0af6f2d50dcbc4234e50940d)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_and_compare(count, isWarning, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-0af6f2d50dcbc4234e50940d)`",
"search_time_series": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_service_time_series( count, isWarning, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-0af6f2d50dcbc4234e50940d)`",
"search_time_series_aggregate": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_service_time_series( count, isWarning, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-0af6f2d50dcbc4234e50940d)`",
"search_time_series_entities": "index=_internal sourcetype=itsi_internal_log \n| rex \"^[0-9\\- :,]+(?<log_level>[A-Z]+)\\s+\\[(?<comp1>.*?)\\]\\s+\\[(?<comp2>.*?)\\]\\s+\\[(?<comp3>.*?)\\]\" \n| search log_level=\"ERROR\" OR log_level=\"WAR*\"\n| dedup comp1 comp2 comp3\n| eval isError=if(log_level=\"ERROR\", 1, 0), isWarning=if(log_level like \"WAR%\", 1, 0) | `aggregate_raw_into_service_time_series( count, isWarning, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-0af6f2d50dcbc4234e50940d)`",
"search_type": "shared_base",
"service_title": "Splunk ITSI Metrics",
"threshold_eval": "",
"threshold_field": "isWarning",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "ITSI Log Warnings",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "max",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_introspection source=*introspection*kvstore.log* data.ns=SA-ITOA.itsi_refresh_queue",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-itsi-refresh-queue",
"base_search_metric": "refresh-queue-data-count",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "host",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "custom_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": false,
"key": "da-itsi-cp-monitoring-splunk-00a8c57f1cbd4ca1583d42c4",
"kpi_base_search": "index=_introspection source=*introspection*kvstore.log* data.ns=SA-ITOA.itsi_refresh_queue",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_introspection source=*introspection*kvstore.log* data.ns=SA-ITOA.itsi_refresh_queue | `aggregate_raw_into_service(max, data.count)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-00a8c57f1cbd4ca1583d42c4, true, true, true)` | eval kpi=\"ITSI Refresh Queue Data Count\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_introspection source=*introspection*kvstore.log* data.ns=SA-ITOA.itsi_refresh_queue | `aggregate_raw_into_single_value(max, data.count, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-00a8c57f1cbd4ca1583d42c4)`",
"search_alert": "index=_introspection source=*introspection*kvstore.log* data.ns=SA-ITOA.itsi_refresh_queue | `aggregate_raw_into_service(max, data.count)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-00a8c57f1cbd4ca1583d42c4, true, true, true)` | eval kpi=\"ITSI Refresh Queue Data Count\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_introspection source=*introspection*kvstore.log* data.ns=SA-ITOA.itsi_refresh_queue | `aggregate_raw_into_single_value(max, data.count, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-00a8c57f1cbd4ca1583d42c4)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_introspection source=*introspection*kvstore.log* data.ns=SA-ITOA.itsi_refresh_queue | `aggregate_raw_and_compare(max, data.count, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-00a8c57f1cbd4ca1583d42c4)`",
"search_time_series": "index=_introspection source=*introspection*kvstore.log* data.ns=SA-ITOA.itsi_refresh_queue | `aggregate_raw_into_service_time_series( max, data.count, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-00a8c57f1cbd4ca1583d42c4)`",
"search_time_series_aggregate": "index=_introspection source=*introspection*kvstore.log* data.ns=SA-ITOA.itsi_refresh_queue | `aggregate_raw_into_service_time_series( max, data.count, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-00a8c57f1cbd4ca1583d42c4)`",
"search_time_series_entities": "index=_introspection source=*introspection*kvstore.log* data.ns=SA-ITOA.itsi_refresh_queue | `aggregate_raw_into_service_time_series( max, data.count, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-00a8c57f1cbd4ca1583d42c4)`",
"search_type": "shared_base",
"service_title": "Splunk ITSI Metrics",
"threshold_eval": "",
"threshold_field": "data.count",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "ITSI Refresh Queue Data Count",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "#",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "sum",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#AED3E5",
"base_severity_color_light": "#E3F0F6",
"base_severity_label": "info",
"base_severity_value": 1.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-itsi-kpi-performance",
"base_search_metric": "kpi-run-count",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "kpi",
"entity_statop": "sum",
"entity_thresholds": {
"base_severity_color": "#AED3E5",
"base_severity_color_light": "#E3F0F6",
"base_severity_label": "info",
"base_severity_value": 1.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 0.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-76ac11f6cb10d26de32571e4",
"kpi_base_search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity(sum, run_count, \"kpi\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(kpi, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-76ac11f6cb10d26de32571e4, true, true, true)` | eval kpi=\"KPI Count\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_single_value(sum, sum, run_count, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-76ac11f6cb10d26de32571e4)`",
"search_alert": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity(sum, run_count, \"kpi\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(kpi, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-76ac11f6cb10d26de32571e4, true, true, true)` | eval kpi=\"KPI Count\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_single_value(sum, sum, run_count, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-76ac11f6cb10d26de32571e4)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_and_compare(sum, sum, run_count, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-76ac11f6cb10d26de32571e4)`",
"search_time_series": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity_time_series(sum, run_count, \"kpi\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-76ac11f6cb10d26de32571e4)`",
"search_time_series_aggregate": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity_time_series(sum, run_count, \"kpi\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-76ac11f6cb10d26de32571e4)`",
"search_time_series_entities": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_limited_entity_time_series(sum, run_count, \"kpi\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ITSI Metrics",
"threshold_eval": "",
"threshold_field": "run_count",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "KPI Count",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "sum",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 22,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 22.0,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 3.0
},
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 5.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 15.0
},
{
"dynamic_param": 0.0,
"severity_color": "#B50101",
"severity_color_light": "#E5A6A6",
"severity_label": "critical",
"severity_label_localized": null,
"severity_value": 6.0,
"threshold_value": 20.0
}
]
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-itsi-kpi-performance",
"base_search_metric": "failed",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "kpi",
"entity_statop": "sum",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 4,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 4.4,
"render_boundary_min": 0.0,
"threshold_levels": [
{
"dynamic_param": 0.0,
"severity_color": "#FFE98C",
"severity_color_light": "#FFF4C5",
"severity_label": "low",
"severity_label_localized": null,
"severity_value": 3.0,
"threshold_value": 1.0
},
{
"dynamic_param": 0.0,
"severity_color": "#FCB64E",
"severity_color_light": "#FEE6C1",
"severity_label": "medium",
"severity_label_localized": null,
"severity_value": 4.0,
"threshold_value": 2.0
},
{
"dynamic_param": 0.0,
"severity_color": "#F26A35",
"severity_color_light": "#FBCBB9",
"severity_label": "high",
"severity_label_localized": null,
"severity_value": 5.0,
"threshold_value": 3.0
},
{
"dynamic_param": 0.0,
"severity_color": "#B50101",
"severity_color_light": "#E5A6A6",
"severity_label": "critical",
"severity_label_localized": null,
"severity_value": 6.0,
"threshold_value": 4.0
}
]
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-2532e738130c41692a6eab20",
"kpi_base_search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity(sum, failed_count, \"kpi\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(kpi, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-2532e738130c41692a6eab20, true, true, true)` | eval kpi=\"KPI Search Failed\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_single_value(sum, sum, failed_count, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-2532e738130c41692a6eab20)`",
"search_alert": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity(sum, failed_count, \"kpi\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(kpi, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-2532e738130c41692a6eab20, true, true, true)` | eval kpi=\"KPI Search Failed\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_single_value(sum, sum, failed_count, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-2532e738130c41692a6eab20)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_and_compare(sum, sum, failed_count, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-2532e738130c41692a6eab20)`",
"search_time_series": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity_time_series(sum, failed_count, \"kpi\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-2532e738130c41692a6eab20)`",
"search_time_series_aggregate": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity_time_series(sum, failed_count, \"kpi\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-2532e738130c41692a6eab20)`",
"search_time_series_entities": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_limited_entity_time_series(sum, failed_count, \"kpi\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ITSI Metrics",
"threshold_eval": "",
"threshold_field": "failed_count",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "KPI Search Failed",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "avg",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 2.8113,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-itsi-kpi-performance",
"base_search_metric": "runtime",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "kpi",
"entity_statop": "avg",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 5.1351,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-59d4bb84e51ebc03e4e3cc1f",
"kpi_base_search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity(avg, run_time, \"kpi\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(kpi, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-59d4bb84e51ebc03e4e3cc1f, true, true, true)` | eval kpi=\"Runtime Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_single_value(avg, avg, run_time, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-59d4bb84e51ebc03e4e3cc1f)`",
"search_alert": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity(avg, run_time, \"kpi\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(kpi, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(avg)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-59d4bb84e51ebc03e4e3cc1f, true, true, true)` | eval kpi=\"Runtime Avg\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_single_value(avg, avg, run_time, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-59d4bb84e51ebc03e4e3cc1f)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_and_compare(avg, avg, run_time, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-59d4bb84e51ebc03e4e3cc1f)`",
"search_time_series": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity_time_series(avg, run_time, \"kpi\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-59d4bb84e51ebc03e4e3cc1f)`",
"search_time_series_aggregate": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity_time_series(avg, run_time, \"kpi\", 5)` | `aggregate_entity_into_service_time_series(avg, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-59d4bb84e51ebc03e4e3cc1f)`",
"search_time_series_entities": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_limited_entity_time_series(avg, run_time, \"kpi\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ITSI Metrics",
"threshold_eval": "",
"threshold_field": "run_time",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Runtime Avg",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
},
{
"adaptive_thresholding_training_window": "-7d",
"adaptive_thresholds_is_enabled": false,
"aggregate_eval": "",
"aggregate_statop": "max",
"aggregate_threshold_alert_enabled": false,
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 5.0789,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"aggregate_thresholds_alert_enabled": false,
"aggregate_thresholds_custom_alert_enabled": false,
"aggregate_thresholds_custom_alert_rules": [],
"alert_eval": "",
"alert_lag": "5",
"alert_on": "both",
"alert_period": "5",
"anomaly_detection_alerting_enabled": false,
"anomaly_detection_is_enabled": false,
"anomaly_detection_sensitivity": null,
"anomaly_detection_training_window": null,
"backfill_earliest_time": "-7d",
"backfill_enabled": false,
"base_search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi",
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-itsi-kpi-performance",
"base_search_metric": "runtime-max",
"cohesive_ad": {
"sensitivity": 8
},
"cohesive_anomaly_detection_is_enabled": false,
"datamodel": {
"datamodel": "",
"field": "",
"object": "",
"owner_field": ""
},
"datamodel_filter": [],
"datamodel_filter_clauses": null,
"description": "",
"enabled": true,
"entity_filter_field": "host",
"entity_split_field": "kpi",
"entity_statop": "max",
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 5.1351,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"fill_gaps": "null_value",
"gap_custom_alert_value": 0.0,
"gap_severity": "unknown",
"gap_severity_color": "#CCCCCC",
"gap_severity_color_light": "#EEEEEE",
"gap_severity_value": "-1",
"is_filter_entities_to_service": false,
"is_split_by_entity": true,
"key": "da-itsi-cp-monitoring-splunk-8fbfe1c34813e6903ac5ac2e",
"kpi_base_search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi",
"kpi_template_kpi_id": "",
"kpi_threshold_template_id": "",
"metric_qualifier": "",
"metric_search_spec": {
"metric_index": "",
"metric_name": ""
},
"search": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity(max, run_time, \"kpi\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(kpi, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-8fbfe1c34813e6903ac5ac2e, true, true, true)` | eval kpi=\"Runtime Max\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_aggregate": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_single_value(max, max, run_time, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-8fbfe1c34813e6903ac5ac2e)`",
"search_alert": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity(max, run_time, \"kpi\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(kpi, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `aggregate_entity_into_service(max)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-8fbfe1c34813e6903ac5ac2e, true, true, true)` | eval kpi=\"Runtime Max\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-itsi-metrics\" | `assess_urgency` | `gettime`",
"search_alert_earliest": "5",
"search_alert_entities": "",
"search_buckets": "",
"search_entities": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_single_value(max, max, run_time, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-8fbfe1c34813e6903ac5ac2e)`",
"search_occurrences": 1.0,
"search_time_compare": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_and_compare(max, max, run_time, \"kpi\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-8fbfe1c34813e6903ac5ac2e)`",
"search_time_series": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity_time_series(max, run_time, \"kpi\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-8fbfe1c34813e6903ac5ac2e)`",
"search_time_series_aggregate": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_entity_time_series(max, run_time, \"kpi\", 5)` | `aggregate_entity_into_service_time_series(max, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-itsi-metrics, da-itsi-cp-monitoring-splunk-8fbfe1c34813e6903ac5ac2e)`",
"search_time_series_entities": "index=_internal sourcetype=scheduler savedsearch_name=\"Indicator*\" \n| fields status, success, run_time, _time, savedsearch_name \n| eval success_ct = if(status=\"success\", 1, 0), remote_success_ct=if(status=\"delegated_remote_completion\" AND success=1, 1, 0), remote_failed_ct=if((status=\"delegated_remote_completion\" AND success=0) OR status=\"delegated_remote_error\", 1, 0), skipped_ct=if(status=\"skipped\", 1, 0), remote_dispatched_ct=if(status=\"delegated_remote\", 1, 0), suppressed_ct=if(suppressed!=\"0\", 1, 0) \n| eval run_count=if(remote_dispatched_ct>0, 1, 0), failed_count=if((remote_failed_ct>0), 1, 0) \n| eval KPI_search_type=if(savedsearch_name like \"%Shared%\", \"base\", \"ad-hoc\")\n| rename savedsearch_name as kpi | `aggregate_raw_into_limited_entity_time_series(max, run_time, \"kpi\", 5)`",
"search_type": "shared_base",
"service_title": "Splunk ITSI Metrics",
"threshold_eval": "",
"threshold_field": "run_time",
"time_policies": {
"policies": {
"default_policy": {
"aggregate_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"entity_thresholds": {
"base_severity_color": "#99D18B",
"base_severity_color_light": "#DCEFD7",
"base_severity_label": "normal",
"base_severity_value": 2.0,
"gauge_max": 100,
"gauge_min": 0,
"is_max_static": false,
"is_min_static": true,
"metric_field": "count",
"render_boundary_max": 100.0,
"render_boundary_min": 0.0,
"threshold_levels": []
},
"policy_type": "static",
"time_blocks": [],
"title": "Default"
}
}
},
"title": "Runtime Max",
"trending_ad": {
"sensitivity": 8
},
"type": "kpis_primary",
"tz_offset": null,
"unit": "",
"urgency": 5.0,
"use_time_policies": false
}
],
"service_tags": {
"tags": [],
"template_tags": []
},
"service_template_id": "",
"services_depending_on_me": [
{
"kpis_depending_on": [
"SHKPI-da-itsi-cp-monitoring-splunk-splunk-itsi-metrics"
],
"service_id": "da-itsi-cp-monitoring-splunk-splunk-itsi"
}
],
"services_depends_on": [],
"team_id": "default_itsi_security_group",
"title": "Splunk ITSI Metrics",
"version": "0.0.38"
}