You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1415 lines
85 KiB
1415 lines
85 KiB
{
|
|
"algorithms": {
|
|
"GradientBoostingRegressor": {
|
|
"RMSE": 0,
|
|
"modelId": "",
|
|
"rSquared": 0,
|
|
"recommended": false
|
|
},
|
|
"LinearRegression": {
|
|
"RMSE": 0,
|
|
"modelId": "",
|
|
"rSquared": 0,
|
|
"recommended": false
|
|
},
|
|
"LogisticRegression": {
|
|
"accuracy": 0,
|
|
"f1_score": 0,
|
|
"modelId": "",
|
|
"precision": 0,
|
|
"recall": 0,
|
|
"recommended": false
|
|
},
|
|
"RandomForestRegressor": {
|
|
"RMSE": 0,
|
|
"modelId": "",
|
|
"rSquared": 0,
|
|
"recommended": false
|
|
}
|
|
},
|
|
"description": "",
|
|
"enabled": true,
|
|
"entity_rules": [],
|
|
"key": "da-itsi-cp-monitoring-splunk-splunk-forwarder",
|
|
"kpis": [
|
|
{
|
|
"adaptive_thresholding_training_window": "-7d",
|
|
"adaptive_thresholds_is_enabled": false,
|
|
"aggregate_eval": "",
|
|
"aggregate_statop": "avg",
|
|
"aggregate_threshold_alert_enabled": false,
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": [
|
|
{
|
|
"dynamic_param": null,
|
|
"severity_color": "#B50101",
|
|
"severity_color_light": "#E5A6A6",
|
|
"severity_label": "critical",
|
|
"severity_label_localized": null,
|
|
"severity_value": 6.0,
|
|
"threshold_value": 0.0
|
|
},
|
|
{
|
|
"dynamic_param": null,
|
|
"severity_color": "#F26A35",
|
|
"severity_color_light": "#FBCBB9",
|
|
"severity_label": "high",
|
|
"severity_label_localized": null,
|
|
"severity_value": 5.0,
|
|
"threshold_value": 20.0
|
|
},
|
|
{
|
|
"dynamic_param": null,
|
|
"severity_color": "#FCB64E",
|
|
"severity_color_light": "#FEE6C1",
|
|
"severity_label": "medium",
|
|
"severity_label_localized": null,
|
|
"severity_value": 4.0,
|
|
"threshold_value": 40.0
|
|
},
|
|
{
|
|
"dynamic_param": null,
|
|
"severity_color": "#FFE98C",
|
|
"severity_color_light": "#FFF4C5",
|
|
"severity_label": "low",
|
|
"severity_label_localized": null,
|
|
"severity_value": 3.0,
|
|
"threshold_value": 60.0
|
|
},
|
|
{
|
|
"dynamic_param": null,
|
|
"severity_color": "#99D18B",
|
|
"severity_color_light": "#DCEFD7",
|
|
"severity_label": "normal",
|
|
"severity_label_localized": null,
|
|
"severity_value": 2.0,
|
|
"threshold_value": 80.0
|
|
}
|
|
]
|
|
},
|
|
"aggregate_thresholds_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_rules": [],
|
|
"alert_eval": "",
|
|
"alert_lag": "30",
|
|
"alert_on": "both",
|
|
"alert_period": "1",
|
|
"anomaly_detection_alerting_enabled": false,
|
|
"anomaly_detection_is_enabled": false,
|
|
"anomaly_detection_sensitivity": 0.999,
|
|
"anomaly_detection_training_window": "-7d",
|
|
"backfill_earliest_time": "-7d",
|
|
"backfill_enabled": false,
|
|
"base_search": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-forwarder)`",
|
|
"base_search_id": null,
|
|
"base_search_metric": null,
|
|
"cohesive_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"cohesive_anomaly_detection_is_enabled": false,
|
|
"datamodel": {
|
|
"datamodel": "",
|
|
"field": "",
|
|
"object": "",
|
|
"owner_field": ""
|
|
},
|
|
"datamodel_filter": [],
|
|
"datamodel_filter_clauses": null,
|
|
"description": "",
|
|
"enabled": false,
|
|
"entity_filter_field": "",
|
|
"entity_split_field": "",
|
|
"entity_statop": "avg",
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": [
|
|
{
|
|
"dynamic_param": null,
|
|
"severity_color": "#B50101",
|
|
"severity_color_light": "#E5A6A6",
|
|
"severity_label": "critical",
|
|
"severity_label_localized": null,
|
|
"severity_value": 6.0,
|
|
"threshold_value": 0.0
|
|
},
|
|
{
|
|
"dynamic_param": null,
|
|
"severity_color": "#F26A35",
|
|
"severity_color_light": "#FBCBB9",
|
|
"severity_label": "high",
|
|
"severity_label_localized": null,
|
|
"severity_value": 5.0,
|
|
"threshold_value": 20.0
|
|
},
|
|
{
|
|
"dynamic_param": null,
|
|
"severity_color": "#FCB64E",
|
|
"severity_color_light": "#FEE6C1",
|
|
"severity_label": "medium",
|
|
"severity_label_localized": null,
|
|
"severity_value": 4.0,
|
|
"threshold_value": 40.0
|
|
},
|
|
{
|
|
"dynamic_param": null,
|
|
"severity_color": "#FFE98C",
|
|
"severity_color_light": "#FFF4C5",
|
|
"severity_label": "low",
|
|
"severity_label_localized": null,
|
|
"severity_value": 3.0,
|
|
"threshold_value": 60.0
|
|
},
|
|
{
|
|
"dynamic_param": null,
|
|
"severity_color": "#99D18B",
|
|
"severity_color_light": "#DCEFD7",
|
|
"severity_label": "normal",
|
|
"severity_label_localized": null,
|
|
"severity_value": 2.0,
|
|
"threshold_value": 80.0
|
|
}
|
|
]
|
|
},
|
|
"fill_gaps": "null_value",
|
|
"gap_custom_alert_value": 0.0,
|
|
"gap_severity": "unknown",
|
|
"gap_severity_color": "#CCCCCC",
|
|
"gap_severity_color_light": "#EEEEEE",
|
|
"gap_severity_value": "-1",
|
|
"is_filter_entities_to_service": false,
|
|
"is_split_by_entity": false,
|
|
"key": "SHKPI-da-itsi-cp-monitoring-splunk-splunk-forwarder",
|
|
"kpi_base_search": "",
|
|
"kpi_template_kpi_id": "",
|
|
"kpi_threshold_template_id": "",
|
|
"metric_qualifier": null,
|
|
"metric_search_spec": {
|
|
"metric_index": "",
|
|
"metric_name": ""
|
|
},
|
|
"search": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-forwarder)` | stats latest(health_score) AS aggregate",
|
|
"search_aggregate": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-forwarder)` | stats latest(health_score) AS aggregate",
|
|
"search_alert": "",
|
|
"search_alert_earliest": "15",
|
|
"search_alert_entities": "",
|
|
"search_buckets": "",
|
|
"search_entities": null,
|
|
"search_occurrences": 1.0,
|
|
"search_time_compare": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-forwarder)` [| stats count | addinfo | eval search= \"earliest=\" + tostring(info_min_time-(info_max_time-info_min_time))+ \" latest=\" + tostring(info_max_time) |fields search] | addinfo | eval bucket=if(_time<info_max_time-((info_max_time-info_min_time)/2), \"last_window\", \"current_window\") | stats avg(health_score) AS aggregate BY bucket | reverse | delta aggregate AS window_delta | search bucket=current_window | eval window_direction=if(window_delta >0, \"increase\", if(window_delta < 0, \"decrease\", \"none\"))",
|
|
"search_time_series": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-forwarder)` | timechart avg(health_score) AS aggregate",
|
|
"search_time_series_aggregate": "`get_full_itsi_summary_service_health_events(da-itsi-cp-monitoring-splunk-splunk-forwarder)` | timechart avg(health_score) AS aggregate",
|
|
"search_time_series_entities": "",
|
|
"search_type": "adhoc",
|
|
"service_title": "Splunk Forwarder",
|
|
"threshold_eval": "",
|
|
"threshold_field": "aggregate",
|
|
"time_policies": {
|
|
"policies": {
|
|
"default_policy": {
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#AED3E5",
|
|
"base_severity_color_light": "#E3F0F6",
|
|
"base_severity_label": "info",
|
|
"base_severity_value": 1.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#AED3E5",
|
|
"base_severity_color_light": "#E3F0F6",
|
|
"base_severity_label": "info",
|
|
"base_severity_value": 1.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"policy_type": "static",
|
|
"time_blocks": [],
|
|
"title": "Default"
|
|
}
|
|
}
|
|
},
|
|
"title": "ServiceHealthScore",
|
|
"trending_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"type": "service_health",
|
|
"tz_offset": null,
|
|
"unit": "",
|
|
"urgency": 11.0,
|
|
"use_time_policies": false
|
|
},
|
|
{
|
|
"adaptive_thresholding_training_window": "-7d",
|
|
"adaptive_thresholds_is_enabled": false,
|
|
"aggregate_eval": "",
|
|
"aggregate_statop": "dc",
|
|
"aggregate_threshold_alert_enabled": false,
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"aggregate_thresholds_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_rules": [],
|
|
"alert_eval": "",
|
|
"alert_lag": "30",
|
|
"alert_on": "both",
|
|
"alert_period": "5",
|
|
"anomaly_detection_alerting_enabled": false,
|
|
"anomaly_detection_is_enabled": false,
|
|
"anomaly_detection_sensitivity": null,
|
|
"anomaly_detection_training_window": null,
|
|
"backfill_earliest_time": "-7d",
|
|
"backfill_enabled": false,
|
|
"base_search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort",
|
|
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-forwarder-base-search",
|
|
"base_search_metric": "connections",
|
|
"cohesive_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"cohesive_anomaly_detection_is_enabled": false,
|
|
"datamodel": {
|
|
"datamodel": "",
|
|
"field": "",
|
|
"object": "",
|
|
"owner_field": ""
|
|
},
|
|
"datamodel_filter": [],
|
|
"datamodel_filter_clauses": null,
|
|
"description": "",
|
|
"enabled": true,
|
|
"entity_filter_field": "host",
|
|
"entity_split_field": "host",
|
|
"entity_statop": "dc",
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"fill_gaps": "null_value",
|
|
"gap_custom_alert_value": 0.0,
|
|
"gap_severity": "unknown",
|
|
"gap_severity_color": "#CCCCCC",
|
|
"gap_severity_color_light": "#EEEEEE",
|
|
"gap_severity_value": "-1",
|
|
"is_filter_entities_to_service": false,
|
|
"is_split_by_entity": false,
|
|
"key": "da-itsi-cp-monitoring-splunk-fde2b7adc7fc28177ef7f918",
|
|
"kpi_base_search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort",
|
|
"kpi_template_kpi_id": "",
|
|
"kpi_threshold_template_id": "",
|
|
"metric_qualifier": "",
|
|
"metric_search_spec": {
|
|
"metric_index": "",
|
|
"metric_name": ""
|
|
},
|
|
"search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service(dc, connection)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fde2b7adc7fc28177ef7f918, true, true, true)` | eval kpi=\"Connection Count\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_aggregate": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_single_value(dc, connection, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fde2b7adc7fc28177ef7f918)`",
|
|
"search_alert": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service(dc, connection)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fde2b7adc7fc28177ef7f918, true, true, true)` | eval kpi=\"Connection Count\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_alert_earliest": "5",
|
|
"search_alert_entities": "",
|
|
"search_buckets": "",
|
|
"search_entities": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_single_value(dc, connection, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fde2b7adc7fc28177ef7f918)`",
|
|
"search_occurrences": 1.0,
|
|
"search_time_compare": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_and_compare(dc, connection, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fde2b7adc7fc28177ef7f918)`",
|
|
"search_time_series": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( dc, connection, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fde2b7adc7fc28177ef7f918)`",
|
|
"search_time_series_aggregate": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( dc, connection, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fde2b7adc7fc28177ef7f918)`",
|
|
"search_time_series_entities": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( dc, connection, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fde2b7adc7fc28177ef7f918)`",
|
|
"search_type": "shared_base",
|
|
"service_title": "Splunk Forwarder",
|
|
"threshold_eval": "",
|
|
"threshold_field": "connection",
|
|
"time_policies": {
|
|
"policies": {
|
|
"default_policy": {
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"policy_type": "static",
|
|
"time_blocks": [],
|
|
"title": "Default"
|
|
}
|
|
}
|
|
},
|
|
"title": "Connection Count",
|
|
"trending_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"type": "kpis_primary",
|
|
"tz_offset": null,
|
|
"unit": "",
|
|
"urgency": 5.0,
|
|
"use_time_policies": false
|
|
},
|
|
{
|
|
"adaptive_thresholding_training_window": "-7d",
|
|
"adaptive_thresholds_is_enabled": false,
|
|
"aggregate_eval": "",
|
|
"aggregate_statop": "dc",
|
|
"aggregate_threshold_alert_enabled": false,
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"aggregate_thresholds_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_rules": [],
|
|
"alert_eval": "",
|
|
"alert_lag": "30",
|
|
"alert_on": "both",
|
|
"alert_period": "5",
|
|
"anomaly_detection_alerting_enabled": false,
|
|
"anomaly_detection_is_enabled": false,
|
|
"anomaly_detection_sensitivity": null,
|
|
"anomaly_detection_training_window": null,
|
|
"backfill_earliest_time": "-7d",
|
|
"backfill_enabled": false,
|
|
"base_search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort",
|
|
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-forwarder-base-search",
|
|
"base_search_metric": "active-forwarders",
|
|
"cohesive_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"cohesive_anomaly_detection_is_enabled": false,
|
|
"datamodel": {
|
|
"datamodel": "",
|
|
"field": "",
|
|
"object": "",
|
|
"owner_field": ""
|
|
},
|
|
"datamodel_filter": [],
|
|
"datamodel_filter_clauses": null,
|
|
"description": "",
|
|
"enabled": true,
|
|
"entity_filter_field": "host",
|
|
"entity_split_field": "host",
|
|
"entity_statop": "dc",
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"fill_gaps": "null_value",
|
|
"gap_custom_alert_value": 0.0,
|
|
"gap_severity": "unknown",
|
|
"gap_severity_color": "#CCCCCC",
|
|
"gap_severity_color_light": "#EEEEEE",
|
|
"gap_severity_value": "-1",
|
|
"is_filter_entities_to_service": false,
|
|
"is_split_by_entity": false,
|
|
"key": "da-itsi-cp-monitoring-splunk-d09f83e38b12910f5b3693b5",
|
|
"kpi_base_search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort",
|
|
"kpi_template_kpi_id": "",
|
|
"kpi_threshold_template_id": "",
|
|
"metric_qualifier": "",
|
|
"metric_search_spec": {
|
|
"metric_index": "",
|
|
"metric_name": ""
|
|
},
|
|
"search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service(dc, hostname)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d09f83e38b12910f5b3693b5, true, true, true)` | eval kpi=\"Forwarder Count\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_aggregate": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_single_value(dc, hostname, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d09f83e38b12910f5b3693b5)`",
|
|
"search_alert": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service(dc, hostname)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d09f83e38b12910f5b3693b5, true, true, true)` | eval kpi=\"Forwarder Count\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_alert_earliest": "5",
|
|
"search_alert_entities": "",
|
|
"search_buckets": "",
|
|
"search_entities": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_single_value(dc, hostname, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d09f83e38b12910f5b3693b5)`",
|
|
"search_occurrences": 1.0,
|
|
"search_time_compare": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_and_compare(dc, hostname, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d09f83e38b12910f5b3693b5)`",
|
|
"search_time_series": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( dc, hostname, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d09f83e38b12910f5b3693b5)`",
|
|
"search_time_series_aggregate": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( dc, hostname, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d09f83e38b12910f5b3693b5)`",
|
|
"search_time_series_entities": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( dc, hostname, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d09f83e38b12910f5b3693b5)`",
|
|
"search_type": "shared_base",
|
|
"service_title": "Splunk Forwarder",
|
|
"threshold_eval": "",
|
|
"threshold_field": "hostname",
|
|
"time_policies": {
|
|
"policies": {
|
|
"default_policy": {
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"policy_type": "static",
|
|
"time_blocks": [],
|
|
"title": "Default"
|
|
}
|
|
}
|
|
},
|
|
"title": "Forwarder Count",
|
|
"trending_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"type": "kpis_primary",
|
|
"tz_offset": null,
|
|
"unit": "",
|
|
"urgency": 5.0,
|
|
"use_time_policies": false
|
|
},
|
|
{
|
|
"adaptive_thresholding_training_window": "-7d",
|
|
"adaptive_thresholds_is_enabled": false,
|
|
"aggregate_eval": "",
|
|
"aggregate_statop": "sum",
|
|
"aggregate_threshold_alert_enabled": false,
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 1,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 1.1,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": [
|
|
{
|
|
"dynamic_param": 0.0,
|
|
"severity_color": "#FFE98C",
|
|
"severity_color_light": "#FFF4C5",
|
|
"severity_label": "low",
|
|
"severity_label_localized": null,
|
|
"severity_value": 3.0,
|
|
"threshold_value": 1.0
|
|
}
|
|
]
|
|
},
|
|
"aggregate_thresholds_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_rules": [],
|
|
"alert_eval": "",
|
|
"alert_lag": "30",
|
|
"alert_on": "both",
|
|
"alert_period": "5",
|
|
"anomaly_detection_alerting_enabled": false,
|
|
"anomaly_detection_is_enabled": false,
|
|
"anomaly_detection_sensitivity": null,
|
|
"anomaly_detection_training_window": null,
|
|
"backfill_earliest_time": "-7d",
|
|
"backfill_enabled": false,
|
|
"base_search": "index=_internal sourcetype=splunkd component=ThruputProcessor \"Current data\" \"has reached maxKBps\" \n| rex \"throughput\\s\\((?<maxKBps>\\d+)\"\n| fields host, maxKBps",
|
|
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-forwarder-limits",
|
|
"base_search_metric": "throttled-forwarders",
|
|
"cohesive_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"cohesive_anomaly_detection_is_enabled": false,
|
|
"datamodel": {
|
|
"datamodel": "",
|
|
"field": "",
|
|
"object": "",
|
|
"owner_field": ""
|
|
},
|
|
"datamodel_filter": [],
|
|
"datamodel_filter_clauses": null,
|
|
"description": "",
|
|
"enabled": true,
|
|
"entity_filter_field": "host",
|
|
"entity_split_field": "host",
|
|
"entity_statop": "dc",
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 3,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 3.3,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": [
|
|
{
|
|
"dynamic_param": 0.0,
|
|
"severity_color": "#FFE98C",
|
|
"severity_color_light": "#FFF4C5",
|
|
"severity_label": "low",
|
|
"severity_label_localized": null,
|
|
"severity_value": 3.0,
|
|
"threshold_value": 1.0
|
|
},
|
|
{
|
|
"dynamic_param": 0.0,
|
|
"severity_color": "#FCB64E",
|
|
"severity_color_light": "#FEE6C1",
|
|
"severity_label": "medium",
|
|
"severity_label_localized": null,
|
|
"severity_value": 4.0,
|
|
"threshold_value": 2.0
|
|
},
|
|
{
|
|
"dynamic_param": 0.0,
|
|
"severity_color": "#F26A35",
|
|
"severity_color_light": "#FBCBB9",
|
|
"severity_label": "high",
|
|
"severity_label_localized": null,
|
|
"severity_value": 5.0,
|
|
"threshold_value": 3.0
|
|
}
|
|
]
|
|
},
|
|
"fill_gaps": "null_value",
|
|
"gap_custom_alert_value": 0.0,
|
|
"gap_severity": "unknown",
|
|
"gap_severity_color": "#CCCCCC",
|
|
"gap_severity_color_light": "#EEEEEE",
|
|
"gap_severity_value": "-1",
|
|
"is_filter_entities_to_service": false,
|
|
"is_split_by_entity": true,
|
|
"key": "da-itsi-cp-monitoring-splunk-fb86b760902826d4e05e52e5",
|
|
"kpi_base_search": "index=_internal sourcetype=splunkd component=ThruputProcessor \"Current data\" \"has reached maxKBps\" \n| rex \"throughput\\s\\((?<maxKBps>\\d+)\"\n| fields host, maxKBps",
|
|
"kpi_template_kpi_id": "",
|
|
"kpi_threshold_template_id": "",
|
|
"metric_qualifier": "",
|
|
"metric_search_spec": {
|
|
"metric_index": "",
|
|
"metric_name": ""
|
|
},
|
|
"search": "index=_internal sourcetype=splunkd component=ThruputProcessor \"Current data\" \"has reached maxKBps\" \n| rex \"throughput\\s\\((?<maxKBps>\\d+)\"\n| fields host, maxKBps | `aggregate_raw_into_entity(dc, count, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fb86b760902826d4e05e52e5, true, true, true)` | eval kpi=\"Forwarder Throttled\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_aggregate": "index=_internal sourcetype=splunkd component=ThruputProcessor \"Current data\" \"has reached maxKBps\" \n| rex \"throughput\\s\\((?<maxKBps>\\d+)\"\n| fields host, maxKBps | `aggregate_raw_into_single_value(dc, sum, count, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fb86b760902826d4e05e52e5)`",
|
|
"search_alert": "index=_internal sourcetype=splunkd component=ThruputProcessor \"Current data\" \"has reached maxKBps\" \n| rex \"throughput\\s\\((?<maxKBps>\\d+)\"\n| fields host, maxKBps | `aggregate_raw_into_entity(dc, count, \"host\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(host, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fb86b760902826d4e05e52e5, true, true, true)` | eval kpi=\"Forwarder Throttled\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_alert_earliest": "5",
|
|
"search_alert_entities": "",
|
|
"search_buckets": "",
|
|
"search_entities": "index=_internal sourcetype=splunkd component=ThruputProcessor \"Current data\" \"has reached maxKBps\" \n| rex \"throughput\\s\\((?<maxKBps>\\d+)\"\n| fields host, maxKBps | `aggregate_raw_into_single_value(dc, sum, count, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fb86b760902826d4e05e52e5)`",
|
|
"search_occurrences": 1.0,
|
|
"search_time_compare": "index=_internal sourcetype=splunkd component=ThruputProcessor \"Current data\" \"has reached maxKBps\" \n| rex \"throughput\\s\\((?<maxKBps>\\d+)\"\n| fields host, maxKBps | `aggregate_raw_and_compare(dc, sum, count, \"host\", 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fb86b760902826d4e05e52e5)`",
|
|
"search_time_series": "index=_internal sourcetype=splunkd component=ThruputProcessor \"Current data\" \"has reached maxKBps\" \n| rex \"throughput\\s\\((?<maxKBps>\\d+)\"\n| fields host, maxKBps | `aggregate_raw_into_entity_time_series(dc, count, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fb86b760902826d4e05e52e5)`",
|
|
"search_time_series_aggregate": "index=_internal sourcetype=splunkd component=ThruputProcessor \"Current data\" \"has reached maxKBps\" \n| rex \"throughput\\s\\((?<maxKBps>\\d+)\"\n| fields host, maxKBps | `aggregate_raw_into_entity_time_series(dc, count, \"host\", 5)` | `aggregate_entity_into_service_time_series(sum, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-fb86b760902826d4e05e52e5)`",
|
|
"search_time_series_entities": "index=_internal sourcetype=splunkd component=ThruputProcessor \"Current data\" \"has reached maxKBps\" \n| rex \"throughput\\s\\((?<maxKBps>\\d+)\"\n| fields host, maxKBps | `aggregate_raw_into_limited_entity_time_series(dc, count, \"host\", 5)`",
|
|
"search_type": "shared_base",
|
|
"service_title": "Splunk Forwarder",
|
|
"threshold_eval": "",
|
|
"threshold_field": "count",
|
|
"time_policies": {
|
|
"policies": {
|
|
"default_policy": {
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"policy_type": "static",
|
|
"time_blocks": [],
|
|
"title": "Default"
|
|
}
|
|
}
|
|
},
|
|
"title": "Forwarder Throttled",
|
|
"trending_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"type": "kpis_primary",
|
|
"tz_offset": null,
|
|
"unit": "ct",
|
|
"urgency": 5.0,
|
|
"use_time_policies": false
|
|
},
|
|
{
|
|
"adaptive_thresholding_training_window": "-7d",
|
|
"adaptive_thresholds_is_enabled": false,
|
|
"aggregate_eval": "",
|
|
"aggregate_statop": "sum",
|
|
"aggregate_threshold_alert_enabled": false,
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 3,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": [
|
|
{
|
|
"dynamic_param": 0.0,
|
|
"severity_color": "#FFE98C",
|
|
"severity_color_light": "#FFF4C5",
|
|
"severity_label": "low",
|
|
"severity_label_localized": null,
|
|
"severity_value": 3.0,
|
|
"threshold_value": 1.1
|
|
},
|
|
{
|
|
"dynamic_param": 0.0,
|
|
"severity_color": "#FCB64E",
|
|
"severity_color_light": "#FEE6C1",
|
|
"severity_label": "medium",
|
|
"severity_label_localized": null,
|
|
"severity_value": 4.0,
|
|
"threshold_value": 2.0
|
|
},
|
|
{
|
|
"dynamic_param": 0.0,
|
|
"severity_color": "#F26A35",
|
|
"severity_color_light": "#FBCBB9",
|
|
"severity_label": "high",
|
|
"severity_label_localized": null,
|
|
"severity_value": 5.0,
|
|
"threshold_value": 3.0
|
|
}
|
|
]
|
|
},
|
|
"aggregate_thresholds_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_rules": [],
|
|
"alert_eval": "",
|
|
"alert_lag": "30",
|
|
"alert_on": "both",
|
|
"alert_period": "15",
|
|
"anomaly_detection_alerting_enabled": false,
|
|
"anomaly_detection_is_enabled": false,
|
|
"anomaly_detection_sensitivity": null,
|
|
"anomaly_detection_training_window": null,
|
|
"backfill_earliest_time": "-7d",
|
|
"backfill_enabled": false,
|
|
"base_search": "index=_internal source=\"*metrics.log\" group=tcpin_connections fwdType=uf connectionType=cooked \n| fields hostname, version, ip, os, guid\n| stats dc(hostname) as hostname_count, values(hostname) as hostnames, values(version) as version, values(ip) as ip, values(os) as os by guid \n| where hostname_count > 1 \n| sort - hostname_count",
|
|
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-forwarder-guid",
|
|
"base_search_metric": "forwarder-guid-count",
|
|
"cohesive_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"cohesive_anomaly_detection_is_enabled": false,
|
|
"datamodel": {
|
|
"datamodel": "",
|
|
"field": "",
|
|
"object": "",
|
|
"owner_field": ""
|
|
},
|
|
"datamodel_filter": [],
|
|
"datamodel_filter_clauses": null,
|
|
"description": "",
|
|
"enabled": true,
|
|
"entity_filter_field": "host",
|
|
"entity_split_field": "guid",
|
|
"entity_statop": "max",
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 3,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": [
|
|
{
|
|
"dynamic_param": 0.0,
|
|
"severity_color": "#FFE98C",
|
|
"severity_color_light": "#FFF4C5",
|
|
"severity_label": "low",
|
|
"severity_label_localized": null,
|
|
"severity_value": 3.0,
|
|
"threshold_value": 1.1
|
|
},
|
|
{
|
|
"dynamic_param": 0.0,
|
|
"severity_color": "#FCB64E",
|
|
"severity_color_light": "#FEE6C1",
|
|
"severity_label": "medium",
|
|
"severity_label_localized": null,
|
|
"severity_value": 4.0,
|
|
"threshold_value": 2.0
|
|
},
|
|
{
|
|
"dynamic_param": 0.0,
|
|
"severity_color": "#F26A35",
|
|
"severity_color_light": "#FBCBB9",
|
|
"severity_label": "high",
|
|
"severity_label_localized": null,
|
|
"severity_value": 5.0,
|
|
"threshold_value": 3.0
|
|
}
|
|
]
|
|
},
|
|
"fill_gaps": "custom_value",
|
|
"gap_custom_alert_value": 0.0,
|
|
"gap_severity": "unknown",
|
|
"gap_severity_color": "#CCCCCC",
|
|
"gap_severity_color_light": "#EEEEEE",
|
|
"gap_severity_value": "-1",
|
|
"is_filter_entities_to_service": false,
|
|
"is_split_by_entity": true,
|
|
"key": "da-itsi-cp-monitoring-splunk-2bfefdae5843d8a91915d662",
|
|
"kpi_base_search": "index=_internal source=\"*metrics.log\" group=tcpin_connections fwdType=uf connectionType=cooked \n| fields hostname, version, ip, os, guid\n| stats dc(hostname) as hostname_count, values(hostname) as hostnames, values(version) as version, values(ip) as ip, values(os) as os by guid \n| where hostname_count > 1 \n| sort - hostname_count",
|
|
"kpi_template_kpi_id": "",
|
|
"kpi_threshold_template_id": "",
|
|
"metric_qualifier": "",
|
|
"metric_search_spec": {
|
|
"metric_index": "",
|
|
"metric_name": ""
|
|
},
|
|
"search": "index=_internal source=\"*metrics.log\" group=tcpin_connections fwdType=uf connectionType=cooked \n| fields hostname, version, ip, os, guid\n| stats dc(hostname) as hostname_count, values(hostname) as hostnames, values(version) as version, values(ip) as ip, values(os) as os by guid \n| where hostname_count > 1 \n| sort - hostname_count | `aggregate_raw_into_entity(max, hostname_count, \"guid\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(guid, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-2bfefdae5843d8a91915d662, true, true, true)` | eval kpi=\"GUIDs per Hostname\", urgency=\"5.0\", alert_period=\"15\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_aggregate": "index=_internal source=\"*metrics.log\" group=tcpin_connections fwdType=uf connectionType=cooked \n| fields hostname, version, ip, os, guid\n| stats dc(hostname) as hostname_count, values(hostname) as hostnames, values(version) as version, values(ip) as ip, values(os) as os by guid \n| where hostname_count > 1 \n| sort - hostname_count | `aggregate_raw_into_single_value(max, sum, hostname_count, \"guid\", 15)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-2bfefdae5843d8a91915d662)`",
|
|
"search_alert": "index=_internal source=\"*metrics.log\" group=tcpin_connections fwdType=uf connectionType=cooked \n| fields hostname, version, ip, os, guid\n| stats dc(hostname) as hostname_count, values(hostname) as hostnames, values(version) as version, values(ip) as ip, values(os) as os by guid \n| where hostname_count > 1 \n| sort - hostname_count | `aggregate_raw_into_entity(max, hostname_count, \"guid\")` | eval sec_grp = \"default_itsi_security_group\" | `match_entities(guid, sec_grp)` | eval serviceid = \"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `aggregate_entity_into_service(sum)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-2bfefdae5843d8a91915d662, true, true, true)` | eval kpi=\"GUIDs per Hostname\", urgency=\"5.0\", alert_period=\"15\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_alert_earliest": "15",
|
|
"search_alert_entities": "",
|
|
"search_buckets": "",
|
|
"search_entities": "index=_internal source=\"*metrics.log\" group=tcpin_connections fwdType=uf connectionType=cooked \n| fields hostname, version, ip, os, guid\n| stats dc(hostname) as hostname_count, values(hostname) as hostnames, values(version) as version, values(ip) as ip, values(os) as os by guid \n| where hostname_count > 1 \n| sort - hostname_count | `aggregate_raw_into_single_value(max, sum, hostname_count, \"guid\", 15)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-2bfefdae5843d8a91915d662)`",
|
|
"search_occurrences": 1.0,
|
|
"search_time_compare": "index=_internal source=\"*metrics.log\" group=tcpin_connections fwdType=uf connectionType=cooked \n| fields hostname, version, ip, os, guid\n| stats dc(hostname) as hostname_count, values(hostname) as hostnames, values(version) as version, values(ip) as ip, values(os) as os by guid \n| where hostname_count > 1 \n| sort - hostname_count | `aggregate_raw_and_compare(max, sum, hostname_count, \"guid\", 15)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-2bfefdae5843d8a91915d662)`",
|
|
"search_time_series": "index=_internal source=\"*metrics.log\" group=tcpin_connections fwdType=uf connectionType=cooked \n| fields hostname, version, ip, os, guid\n| stats dc(hostname) as hostname_count, values(hostname) as hostnames, values(version) as version, values(ip) as ip, values(os) as os by guid \n| where hostname_count > 1 \n| sort - hostname_count | `aggregate_raw_into_entity_time_series(max, hostname_count, \"guid\", 15)` | `aggregate_entity_into_service_time_series(sum, 15)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-2bfefdae5843d8a91915d662)`",
|
|
"search_time_series_aggregate": "index=_internal source=\"*metrics.log\" group=tcpin_connections fwdType=uf connectionType=cooked \n| fields hostname, version, ip, os, guid\n| stats dc(hostname) as hostname_count, values(hostname) as hostnames, values(version) as version, values(ip) as ip, values(os) as os by guid \n| where hostname_count > 1 \n| sort - hostname_count | `aggregate_raw_into_entity_time_series(max, hostname_count, \"guid\", 15)` | `aggregate_entity_into_service_time_series(sum, 15)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-2bfefdae5843d8a91915d662)`",
|
|
"search_time_series_entities": "index=_internal source=\"*metrics.log\" group=tcpin_connections fwdType=uf connectionType=cooked \n| fields hostname, version, ip, os, guid\n| stats dc(hostname) as hostname_count, values(hostname) as hostnames, values(version) as version, values(ip) as ip, values(os) as os by guid \n| where hostname_count > 1 \n| sort - hostname_count | `aggregate_raw_into_limited_entity_time_series(max, hostname_count, \"guid\", 15)`",
|
|
"search_type": "shared_base",
|
|
"service_title": "Splunk Forwarder",
|
|
"threshold_eval": "",
|
|
"threshold_field": "hostname_count",
|
|
"time_policies": {
|
|
"policies": {
|
|
"default_policy": {
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"policy_type": "static",
|
|
"time_blocks": [],
|
|
"title": "Default"
|
|
}
|
|
}
|
|
},
|
|
"title": "GUIDs per Hostname",
|
|
"trending_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"type": "kpis_primary",
|
|
"tz_offset": null,
|
|
"unit": "ct",
|
|
"urgency": 5.0,
|
|
"use_time_policies": false
|
|
},
|
|
{
|
|
"adaptive_thresholding_training_window": "-7d",
|
|
"adaptive_thresholds_is_enabled": false,
|
|
"aggregate_eval": "",
|
|
"aggregate_statop": "sum",
|
|
"aggregate_threshold_alert_enabled": false,
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"aggregate_thresholds_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_rules": [],
|
|
"alert_eval": "",
|
|
"alert_lag": "30",
|
|
"alert_on": "both",
|
|
"alert_period": "5",
|
|
"anomaly_detection_alerting_enabled": false,
|
|
"anomaly_detection_is_enabled": false,
|
|
"anomaly_detection_sensitivity": null,
|
|
"anomaly_detection_training_window": null,
|
|
"backfill_earliest_time": "-7d",
|
|
"backfill_enabled": false,
|
|
"base_search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort",
|
|
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-forwarder-base-search",
|
|
"base_search_metric": "tcp-events-per-second",
|
|
"cohesive_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"cohesive_anomaly_detection_is_enabled": false,
|
|
"datamodel": {
|
|
"datamodel": "",
|
|
"field": "",
|
|
"object": "",
|
|
"owner_field": ""
|
|
},
|
|
"datamodel_filter": [],
|
|
"datamodel_filter_clauses": null,
|
|
"description": "",
|
|
"enabled": true,
|
|
"entity_filter_field": "host",
|
|
"entity_split_field": "host",
|
|
"entity_statop": "avg",
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"fill_gaps": "null_value",
|
|
"gap_custom_alert_value": 0.0,
|
|
"gap_severity": "unknown",
|
|
"gap_severity_color": "#CCCCCC",
|
|
"gap_severity_color_light": "#EEEEEE",
|
|
"gap_severity_value": "-1",
|
|
"is_filter_entities_to_service": false,
|
|
"is_split_by_entity": false,
|
|
"key": "da-itsi-cp-monitoring-splunk-37f9f022d1665c46e40dd0e2",
|
|
"kpi_base_search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort",
|
|
"kpi_template_kpi_id": "",
|
|
"kpi_threshold_template_id": "",
|
|
"metric_qualifier": "",
|
|
"metric_search_spec": {
|
|
"metric_index": "",
|
|
"metric_name": ""
|
|
},
|
|
"search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service(sum, tcp_eps)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-37f9f022d1665c46e40dd0e2, true, true, true)` | eval kpi=\"TCP EPS\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_aggregate": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_single_value(sum, tcp_eps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-37f9f022d1665c46e40dd0e2)`",
|
|
"search_alert": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service(sum, tcp_eps)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-37f9f022d1665c46e40dd0e2, true, true, true)` | eval kpi=\"TCP EPS\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_alert_earliest": "5",
|
|
"search_alert_entities": "",
|
|
"search_buckets": "",
|
|
"search_entities": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_single_value(sum, tcp_eps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-37f9f022d1665c46e40dd0e2)`",
|
|
"search_occurrences": 1.0,
|
|
"search_time_compare": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_and_compare(sum, tcp_eps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-37f9f022d1665c46e40dd0e2)`",
|
|
"search_time_series": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( sum, tcp_eps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-37f9f022d1665c46e40dd0e2)`",
|
|
"search_time_series_aggregate": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( sum, tcp_eps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-37f9f022d1665c46e40dd0e2)`",
|
|
"search_time_series_entities": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( sum, tcp_eps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-37f9f022d1665c46e40dd0e2)`",
|
|
"search_type": "shared_base",
|
|
"service_title": "Splunk Forwarder",
|
|
"threshold_eval": "",
|
|
"threshold_field": "tcp_eps",
|
|
"time_policies": {
|
|
"policies": {
|
|
"default_policy": {
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"policy_type": "static",
|
|
"time_blocks": [],
|
|
"title": "Default"
|
|
}
|
|
}
|
|
},
|
|
"title": "TCP EPS",
|
|
"trending_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"type": "kpis_primary",
|
|
"tz_offset": null,
|
|
"unit": "",
|
|
"urgency": 5.0,
|
|
"use_time_policies": false
|
|
},
|
|
{
|
|
"adaptive_thresholding_training_window": "-7d",
|
|
"adaptive_thresholds_is_enabled": false,
|
|
"aggregate_eval": "",
|
|
"aggregate_statop": "sum",
|
|
"aggregate_threshold_alert_enabled": false,
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"aggregate_thresholds_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_rules": [],
|
|
"alert_eval": "",
|
|
"alert_lag": "30",
|
|
"alert_on": "both",
|
|
"alert_period": "5",
|
|
"anomaly_detection_alerting_enabled": false,
|
|
"anomaly_detection_is_enabled": false,
|
|
"anomaly_detection_sensitivity": null,
|
|
"anomaly_detection_training_window": null,
|
|
"backfill_earliest_time": "-7d",
|
|
"backfill_enabled": false,
|
|
"base_search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort",
|
|
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-forwarder-base-search",
|
|
"base_search_metric": "tcp-kbps",
|
|
"cohesive_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"cohesive_anomaly_detection_is_enabled": false,
|
|
"datamodel": {
|
|
"datamodel": "",
|
|
"field": "",
|
|
"object": "",
|
|
"owner_field": ""
|
|
},
|
|
"datamodel_filter": [],
|
|
"datamodel_filter_clauses": null,
|
|
"description": "",
|
|
"enabled": true,
|
|
"entity_filter_field": "host",
|
|
"entity_split_field": "host",
|
|
"entity_statop": "avg",
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"fill_gaps": "null_value",
|
|
"gap_custom_alert_value": 0.0,
|
|
"gap_severity": "unknown",
|
|
"gap_severity_color": "#CCCCCC",
|
|
"gap_severity_color_light": "#EEEEEE",
|
|
"gap_severity_value": "-1",
|
|
"is_filter_entities_to_service": false,
|
|
"is_split_by_entity": false,
|
|
"key": "da-itsi-cp-monitoring-splunk-d23c258ab7de69fce0b9d7c2",
|
|
"kpi_base_search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort",
|
|
"kpi_template_kpi_id": "",
|
|
"kpi_threshold_template_id": "",
|
|
"metric_qualifier": "",
|
|
"metric_search_spec": {
|
|
"metric_index": "",
|
|
"metric_name": ""
|
|
},
|
|
"search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service(sum, tcp_KBps)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d23c258ab7de69fce0b9d7c2, true, true, true)` | eval kpi=\"TCP KBps\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_aggregate": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_single_value(sum, tcp_KBps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d23c258ab7de69fce0b9d7c2)`",
|
|
"search_alert": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service(sum, tcp_KBps)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d23c258ab7de69fce0b9d7c2, true, true, true)` | eval kpi=\"TCP KBps\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_alert_earliest": "5",
|
|
"search_alert_entities": "",
|
|
"search_buckets": "",
|
|
"search_entities": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_single_value(sum, tcp_KBps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d23c258ab7de69fce0b9d7c2)`",
|
|
"search_occurrences": 1.0,
|
|
"search_time_compare": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_and_compare(sum, tcp_KBps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d23c258ab7de69fce0b9d7c2)`",
|
|
"search_time_series": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( sum, tcp_KBps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d23c258ab7de69fce0b9d7c2)`",
|
|
"search_time_series_aggregate": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( sum, tcp_KBps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d23c258ab7de69fce0b9d7c2)`",
|
|
"search_time_series_entities": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( sum, tcp_KBps, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-d23c258ab7de69fce0b9d7c2)`",
|
|
"search_type": "shared_base",
|
|
"service_title": "Splunk Forwarder",
|
|
"threshold_eval": "",
|
|
"threshold_field": "tcp_KBps",
|
|
"time_policies": {
|
|
"policies": {
|
|
"default_policy": {
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"policy_type": "static",
|
|
"time_blocks": [],
|
|
"title": "Default"
|
|
}
|
|
}
|
|
},
|
|
"title": "TCP KBps",
|
|
"trending_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"type": "kpis_primary",
|
|
"tz_offset": null,
|
|
"unit": "",
|
|
"urgency": 5.0,
|
|
"use_time_policies": false
|
|
},
|
|
{
|
|
"adaptive_thresholding_training_window": "-7d",
|
|
"adaptive_thresholds_is_enabled": false,
|
|
"aggregate_eval": "",
|
|
"aggregate_statop": "sum",
|
|
"aggregate_threshold_alert_enabled": false,
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"aggregate_thresholds_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_enabled": false,
|
|
"aggregate_thresholds_custom_alert_rules": [],
|
|
"alert_eval": "",
|
|
"alert_lag": "30",
|
|
"alert_on": "both",
|
|
"alert_period": "5",
|
|
"anomaly_detection_alerting_enabled": false,
|
|
"anomaly_detection_is_enabled": false,
|
|
"anomaly_detection_sensitivity": null,
|
|
"anomaly_detection_training_window": null,
|
|
"backfill_earliest_time": "-7d",
|
|
"backfill_enabled": false,
|
|
"base_search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort",
|
|
"base_search_id": "da-itsi-cp-monitoring-splunk-splk-forwarder-base-search",
|
|
"base_search_metric": "kb",
|
|
"cohesive_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"cohesive_anomaly_detection_is_enabled": false,
|
|
"datamodel": {
|
|
"datamodel": "",
|
|
"field": "",
|
|
"object": "",
|
|
"owner_field": ""
|
|
},
|
|
"datamodel_filter": [],
|
|
"datamodel_filter_clauses": null,
|
|
"description": "",
|
|
"enabled": true,
|
|
"entity_filter_field": "host",
|
|
"entity_split_field": "host",
|
|
"entity_statop": "sum",
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"fill_gaps": "null_value",
|
|
"gap_custom_alert_value": 0.0,
|
|
"gap_severity": "unknown",
|
|
"gap_severity_color": "#CCCCCC",
|
|
"gap_severity_color_light": "#EEEEEE",
|
|
"gap_severity_value": "-1",
|
|
"is_filter_entities_to_service": false,
|
|
"is_split_by_entity": false,
|
|
"key": "da-itsi-cp-monitoring-splunk-cf85275377b9d99eafa4942f",
|
|
"kpi_base_search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort",
|
|
"kpi_template_kpi_id": "",
|
|
"kpi_threshold_template_id": "",
|
|
"metric_qualifier": "",
|
|
"metric_search_spec": {
|
|
"metric_index": "",
|
|
"metric_name": ""
|
|
},
|
|
"search": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service(sum, kb)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-cf85275377b9d99eafa4942f, true, true, true)` | eval kpi=\"Thruput\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_aggregate": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_single_value(sum, kb, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-cf85275377b9d99eafa4942f)`",
|
|
"search_alert": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service(sum, kb)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-cf85275377b9d99eafa4942f, true, true, true)` | eval kpi=\"Thruput\", urgency=\"5.0\", alert_period=\"5\", serviceid=\"da-itsi-cp-monitoring-splunk-splunk-forwarder\" | `assess_urgency` | `gettime`",
|
|
"search_alert_earliest": "5",
|
|
"search_alert_entities": "",
|
|
"search_buckets": "",
|
|
"search_entities": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_single_value(sum, kb, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-cf85275377b9d99eafa4942f)`",
|
|
"search_occurrences": 1.0,
|
|
"search_time_compare": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_and_compare(sum, kb, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-cf85275377b9d99eafa4942f)`",
|
|
"search_time_series": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( sum, kb, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-cf85275377b9d99eafa4942f)`",
|
|
"search_time_series_aggregate": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( sum, kb, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-cf85275377b9d99eafa4942f)`",
|
|
"search_time_series_entities": "index=_internal sourcetype=splunkd group=tcpin_connections fwdType=* guid=* | fields _time, hostname, sourcePort, kb, tcp_eps, tcp_KBps | eval connection = hostname.\":\".sourcePort | `aggregate_raw_into_service_time_series( sum, kb, 5)` | `assess_severity(da-itsi-cp-monitoring-splunk-splunk-forwarder, da-itsi-cp-monitoring-splunk-cf85275377b9d99eafa4942f)`",
|
|
"search_type": "shared_base",
|
|
"service_title": "Splunk Forwarder",
|
|
"threshold_eval": "",
|
|
"threshold_field": "kb",
|
|
"time_policies": {
|
|
"policies": {
|
|
"default_policy": {
|
|
"aggregate_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"entity_thresholds": {
|
|
"base_severity_color": "#99D18B",
|
|
"base_severity_color_light": "#DCEFD7",
|
|
"base_severity_label": "normal",
|
|
"base_severity_value": 2.0,
|
|
"gauge_max": 100,
|
|
"gauge_min": 0,
|
|
"is_max_static": false,
|
|
"is_min_static": true,
|
|
"metric_field": "count",
|
|
"render_boundary_max": 100.0,
|
|
"render_boundary_min": 0.0,
|
|
"threshold_levels": []
|
|
},
|
|
"policy_type": "static",
|
|
"time_blocks": [],
|
|
"title": "Default"
|
|
}
|
|
}
|
|
},
|
|
"title": "Thruput",
|
|
"trending_ad": {
|
|
"sensitivity": 8
|
|
},
|
|
"type": "kpis_primary",
|
|
"tz_offset": null,
|
|
"unit": "kb",
|
|
"urgency": 5.0,
|
|
"use_time_policies": false
|
|
}
|
|
],
|
|
"service_tags": {
|
|
"tags": [],
|
|
"template_tags": []
|
|
},
|
|
"service_template_id": "",
|
|
"services_depending_on_me": [
|
|
{
|
|
"kpis_depending_on": [
|
|
"SHKPI-da-itsi-cp-monitoring-splunk-splunk-forwarder"
|
|
],
|
|
"service_id": "da-itsi-cp-monitoring-splunk-splunk"
|
|
}
|
|
],
|
|
"services_depends_on": [],
|
|
"team_id": "default_itsi_security_group",
|
|
"title": "Splunk Forwarder",
|
|
"version": "0.0.38"
|
|
} |