Skip to content

Commit 6a638cc

Browse files
committed
Updated regex
1 parent 7033a50 commit 6a638cc

File tree

2 files changed

+11
-1
lines changed

2 files changed

+11
-1
lines changed

README.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -360,6 +360,13 @@ Feel free to open an issue on github or use the contact author on the SplunkBase
360360

361361
## Release Notes
362362
### 4.0.6
363+
Updated reports/alerts:
364+
- `AllSplunkEnterpriseLevel - Splunk Scheduler excessive delays in executing search`
365+
- `AllSplunkEnterpriseLevel - sendmodalert errors`
366+
- `SearchHeadLevel - Alerts that have not fired an action in X days
367+
- `SearchHeadLevel - Scheduled Search Efficiency`
368+
369+
To extract savedsearch_name (as I found you can have savedsearches with double quotes in the title)
363370

364371
### 4.0.5
365372
New alerts:

default/savedsearches.conf

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1604,6 +1604,7 @@ index=_internal `splunkenterprisehosts` sourcetype=scheduler app=* scheduled_tim
16041604
| eval time=strftime(_time,"%+") \
16051605
| eval delay_in_start = (dispatch_time - scheduled_time) \
16061606
| where delay_in_start>100\
1607+
| rex "savedsearch_id=\"[^;]+;[^;]+;(?P<savedsearch_name>.*?)\"," \
16071608
| eval scheduled_time=strftime(scheduled_time,"%+") \
16081609
| eval dispatch_time=strftime(dispatch_time,"%+") \
16091610
| rename time AS endTime \
@@ -1970,6 +1971,7 @@ request.ui_dispatch_view = search
19701971
search = ```Attempt to find alerts that are scheduled but not firing any actions, the alerts may need further review or may no longer be required. The app regex is in here because of some creative alert naming, X:app=Y is a real alert name in my environment!```\
19711972
index=_internal source="*scheduler.log" sourcetype=scheduler `searchheadhosts` alert_actions!="" \
19721973
| rex ", app=\"(?P<app>[^\"]+)\","\
1974+
| rex "savedsearch_id=\"[^;]+;[^;]+;(?P<savedsearch_name>.*?)\"," \
19731975
| stats count by savedsearch_name, app \
19741976
| append \
19751977
[| rest `splunkadmins_restmacro` /servicesNS/-/-/saved/searches \
@@ -2245,7 +2247,7 @@ OR "sendmodalert - Invoking modular alert action"\
22452247
`splunkadmins_sendmodalert_errors`\
22462248
| rex field=results_file "[/\\\]dispatch[/\\\](?P<sid>[^/]+)"\
22472249
| eval sid=if(isnull(sid),"NOMATCH",sid)\
2248-
| join sid type=outer [search index=_internal source="*scheduler.log" sourcetype=scheduler `splunkenterprisehosts` | table sid, savedsearch_name, app, user]\
2250+
| join sid type=outer [search index=_internal source="*scheduler.log" sourcetype=scheduler `splunkenterprisehosts` | rex "savedsearch_id=\"[^;]+;[^;]+;(?P<savedsearch_name>.*?)\"," | table sid, savedsearch_name, app, user]\
22492251
| cluster showcount=true\
22502252
| table host, savedsearch_name, app, user, _raw, _time, cluster_count\
22512253
| eval mostRecent = strftime(mostRecent, "%+")\
@@ -4067,6 +4069,7 @@ request.ui_dispatch_view = search
40674069
search = ```This likely came from a Splunk conf presentation but I cannot remember which one so cannot attribute the original author!\
40684070
Determine the length of time a scheduled search takes to run compared to how often it is configured to run, excluding acceleration jobs```\
40694071
index=_internal `searchheadhosts` sourcetype=scheduler source=*scheduler.log (user=*) savedsearch_name!="_ACCELERATE_DM*"\
4072+
| rex "savedsearch_id=\"[^;]+;[^;]+;(?P<savedsearch_name>.*?)\"," \
40704073
| stats avg(run_time) as average_runtime_in_sec count(savedsearch_name) as num_times_per_week sum(run_time) as total_runtime_sec by savedsearch_name user app host\
40714074
| eval ran_every_x_mins=round(60/(num_times_per_week/168))\
40724075
| eval average_runtime_duration=tostring(round(average_runtime_in_sec/60,2), "duration")\

0 commit comments

Comments
 (0)