savedsearches.conf
The following are the spec and example files for savedsearches.conf
.
savedsearches.conf.spec
# This file contains possible attribute/value pairs for saved search entries in # savedsearches.conf. You can configure saved searches by creating your own # savedsearches.conf. # # There is a default savedsearches.conf in $SPLUNK_HOME/etc/apps/SA-ITOA/default. To # set custom configurations, place a savedsearches.conf in # $SPLUNK_HOME/etc/apps/SA-ITOA/local/. For examples, see # savedsearches.conf.example. You must restart Splunk to enable configurations. # # To learn more about configuration files (including precedence) please see the # documentation located at # http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles
Event generator settings
action.itsi_event_generator = <boolean> * Whether the alert is enabled. action.itsi_event_generator.param.title = <string> * The title of the notable event in Episode Review. * Optional. If title is not provided then the search name becomes the title. action.itsi_event_generator.param.description = <string> * A description of the notable event. * Optional. If a description is not provided then the search description becomes the event description. action.itsi_event_generator.param.owner = <string> * The initial owner of the notable event. * Optional. * Default: unassigned action.itsi_event_generator.param.status = <string> * The triage status of the event in Episode Review. * Values must match an integer specified in the default version of itsi_notable_event_status.conf (or the local version if you created one). * Optional. * Default: 1 (New) action.itsi_event_generator.param.severity = <string> * The level of importance of the event. * Values must match an integer specified in the default version of itsi_notable_event_severity.conf (or the local version if you created one). * Optional. * Default: 1 (Info) action.itsi_event_generator.param.itsi_instruction = <string> * Instructions for how to address the notable event. * Must use tokens such as %fieldname% to map the field name from an external event. Static instructions are not supported. * You can use an aggregation policy to aggregate individual instructions into an episode. By default, episodes display the instructions for the first event in an episode. * Optional. action.itsi_event_generator.param.drilldown_search_title = <string> * You can drill down to a specific Splunk search from an event or episode. * The name of the drilldown search link. * Optional. action.itsi_event_generator.param.drilldown_search_search = <string> * The drilldown search string. * Optional. action.itsi_event_generator.param.drilldown_search_latest_offset = <seconds> * Defines how far ahead from the time of the event, in seconds, to look for related events. * This offset is added to the event time. * Default: 300 (Next 5 minutes) action.itsi_event_generator.param.drilldown_search_earliest_offset = <string> * Defines how far back from the time of the event, in seconds, to start looking for related events. * This offset is subtracted from the event time. * Default: -300 (Last 5 minutes) action.itsi_event_generator.param.drilldown_title = <string> * You can drill down to a specific website from an event or episode. * The name of the drilldown website link. * Optional. action.itsi_event_generator.param.drilldown_uri = <string> * The URI of the website you drill down to. * Optional. param.event_identifier_fields = <comma-separated list> * A list of fields that are used to identify event duplication. * Default: source action.itsi_event_generator.param.service_ids = <comma-separated list> * A list of service IDs representing one or more ITSI services to which this correlation search applies. * Optional. action.itsi_event_generator.param.entity_lookup_field = <string> * The field in the data retrieved by the correlation search that is used to look up corresponding entities. For example, host. * Optional. action.itsi_event_generator.param.search_type = <string> * The search type. * Optional. * Default: custom action.itsi_event_generator.param.meta_data = <string> * The search type of any stored metadata. * Optional. action.itsi_event_generator.param.is_ad_at = <boolean> * Whether this correlation is created by enabling adaptive thresholding or anomaly detection (AT/AD) for KPIs or services. * Optional. * If "1", the correlation is created by AT/AD. * If "0", the correlation is not created by AT/AD. * Default: 0 action.itsi_event_generator.param.ad_at_kpi_ids = <comma-separated list> * A list of KPIs where AT/AD is enabled. * Optional. action.itsi_event_generator.param.editor = <string> * The type of editor used to create the correlation search. * Can be either "advance_correlation_builder_editor", which is the correlation search editor in ITSI, or "multi_kpi_alert_editor", which is the multi-KPI alert builder. * Default: advance_correlation_builder_editor
savedsearches.conf.example
# This is an example savedsearches.conf. Use this file to configure # saved searches. # # To use one or more of these configurations, copy the configuration block # into savedsearches.conf in $SPLUNK_HOME/etc/apps/SA-ITOA/local. # You must restart Splunk to enable configurations. # # To learn more about configuration files (including precedence) please see # the documentation located at # http://docs.splunk.com/Documentation/ITSI/latest/Configure/ListofITSIconfigurationfiles [Test ITSI Reporting Search] cron_schedule = */5 * * * * disabled = False dispatch.earliest_time = -5m dispatch.latest_time = now enableSched = True search = | stats count | eval demo="Demo Search" | fields - count action.itsi_event_generator = 1 action.itsi_event_generator.param.title = "Host $result.host$ is down" action.itsi_event_generator.param.description = Test if host $result.host$ is down or not action.itsi_event_generator.param.owner = admin action.itsi_event_generator.param.status = 1 action.itsi_event_generator.param.severity = 2 action.itsi_event_generator.param.drilldown_search_title = Raw search of seeing $result.host$ events action.itsi_event_generator.param.drilldown_search_search= index=_internal host="$result.host$" action.itsi_event_generator.param.drilldown_search_latest_offset = 30 action.itsi_event_generator.param.drilldown_search_earliest_offset = -30 action.itsi_event_generator.param.drilldown_title = Go to deep dive "$result.sourcetype$" action.itsi_event_generator.param.drilldown_uri = "/en-US/app/itsi/search/" [Test ITSI Notable Event Search] cron_schedule = */5 * * * * disabled = False dispatch.earliest_time = -5m dispatch.latest_time = now enableSched = True search = index=_internal | head 4 alert.digest_mode = 0 action.itsi_event_generator = 1 action.itsi_event_generator.param.title = "Host $result.host$ is down" action.itsi_event_generator.param.description = Test if host $result.host$ is down or not action.itsi_event_generator.param.owner = admin action.itsi_event_generator.param.status = 1 action.itsi_event_generator.param.severity = 2 action.itsi_event_generator.param.drilldown_search_title = Raw search of seeing $result.host$ events action.itsi_event_generator.param.drilldown_search_search= index=_internal host=$result.host$ action.itsi_event_generator.param.drilldown_search_latest_offset = 30 action.itsi_event_generator.param.drilldown_search_earliest_offset = -30 action.itsi_event_generator.param.drilldown_title = Go to deep dive "$result.sourcetype$" action.itsi_event_generator.param.drilldown_uri = "/en-US/app/itsi/search/"
restmap.conf | searchbnf.conf |
This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.17.0, 4.17.1
Feedback submitted, thanks!