Events by Index per Hour | tstats count where index=* by index, _time span=4h prestats=t | timechart span=4h count by index -7d@h now 1 Top Suricata Network Alerts index=suricata | stats values(src_ip) count by alert.signature, alert.signature_id -24h@h now 1
Zeek Network Traffic by Type index=zeek | stats count by _time, tag::eventtype | timechart span=1h count by tag::eventtype -24h@h now
Windows Events by Host | tstats count where index=wineventlog by host, _time span=1h prestats=t | timechart span=1h count by host -24h@h now osquery Events by Host | tstats count where index=osquery by host, _time span=1h prestats=t | timechart span=1h count by host -24h@h now Powershell Event Preview index=powershell | table _time, host, _raw, sourcetype -24h@h now
License Usage | rest splunk_server=local /services/licenser/pools | rename title AS Pool | search [rest splunk_server=local /services/licenser/groups | search is_active=1 | eval stack_id=stack_ids | fields stack_id] | eval quota=if(isnull(effective_quota),quota,effective_quota) | eval "Used"=round(used_bytes/1024/1024/1024, 3) | eval "Quota"=round(quota/1024/1024/1024, 3) | fields Pool "Used" "Quota" 1