All Apps and Add-ons

Search through only failing logs - Jenkins

ddaly
Engager

I am trying to speed up a search on Splunk. The search looks through millions of logs for matches to around 100 event types (each event type has multiple strings to match) so it has ended up being very slow.

The original search I have is:

 

eventtype=fail_type* source="*console" host = $jenkins_server$  | timechart count by eventtype

 

Which plots a timechart of the different types of fails in the console logs of jenkins which is what I want.

I tried to speed up the job by getting it to only look through logs from failing jobs. I can get a table of failing console logs using the search below but if I try to use those console paths for a new search by adding "| search source=console_path" it doesn't work

 

event_tag="job_event" host = $jenkins_server$
| eval job_result=if(type="started", "INPROGRESS", job_result) `utc_to_local_time(job_started_at)`
| search (job_result=FAILURE OR job_result=UNSTABLE OR job_result=ABORTED)
| eval console_path= "*" + build_url + "console*"
| table console_path build_url job_result

 

Apricate any help or suggestions for other ways to speed up the search

Labels (3)
Tags (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Setting aside possible accelerations (have you thought about it?), you end your search with a | table command which returns only given set of fields. You don't have source among them so searching by it won't produce any results.

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise Security 8.0!

Join us on Wednesday, November 20 to learn about Splunk Enterprise Security 8.0!To enhance SOC efficiency, ...

Mastering Threat Hunting

Register to watch Mastering Threat Hunting on Monday, November 18Join us for an insightful talk where we dive ...

Upcoming Community Maintenance: 10/28

Howdy folks, just popping in to let you know that the Splunk Community site will be in read-only mode ...