Knowledge Management
Highlighted

I need to fill missing logs in summary index

Path Finder

so I have this query

(host=pnr-proxy-prod* OR host=master.menlosecurity.com OR host=pnr-webui-prod)
NOT (source=/var/log/safeview/haproxy.log OR source =/var/log/safeview/nginx-access.log)
(level=
OR "error: " OR "ERROR: " OR "warn: " OR "[warn]" OR "WARNING: " OR "INFO:" OR "info:" OR warning: )
| dedup 1 keepempty=false time, msregion,
| bucket time span=5m
| rex field=
raw " (?<=[A+Z] - )(?[a-zA-Z]+)"

| eval level=if(isnull(level) ,other_level, level)

| eval ms_level= if(isnull(level),"no-level",level)

| eval msregion=rtrim(mszone, "abcdefgh")

| eval event=if(isnull(event) ,"no-event", event)

| rex field=host "^(master-|safemail-)?(.*-prod-)?(?[0-9-]+[0-9])"

| stats count(event) as count by time ,event, msregion, source, msversion, mslevel
| sort 0 _time

| collect to some index

the volume for this index by the hour is ~ millions, I missing some data when I compare the results with a more specific search

so my question is how would I fill up the index with the missing data manually using the collect command , i don't have access to the CLI

would inserting this to the query help :

| dedup 1 keepempty=false time ,event, msregion, source, msversion, mslevel

sorry for the noob question I am new to splunk

0 Karma
Highlighted

Re: I need to fill missing logs in summary index

SplunkTrust
SplunkTrust

High level answer would to be find which data is missing and then run your collect command to summary index it. But it would be tricky to find which data is missing considering very heavy amount of data you've. Ideally if you've a specific criteria for which you see data, you need to apply those criteria to both regular search and summary index search and get a diff.

0 Karma
Speak Up for Splunk Careers!

We want to better understand the impact Splunk experience and expertise has has on individuals' careers, and help highlight the growing demand for Splunk skills.