Monitoring Splunk

Does Splunk log the SEARCH MODE (Verbose, Fast...) for each user's search.

splunkclarium
New Member

I would like to determine the search mode (Verbose, Fast...) for each user's search.

I am currently using this search from GoSplunk.c0m but I am having difficulty locating the search mode.

Can anyone assist?

index=_audit action=search sourcetype=audittrail search_id=* NOT (user=splunk-system-user) search!="'typeahead*"
| rex "search\=\'(search|\s+)\s(?P[\n\S\s]+?(?=\'))"
| rex field=search "sourcetype\s*=\s*\"*(?[^\s\"]+)" 
| rex field=search "index\s*=\s*\"*(?[^\s\"]+)"
| stats latest(_time) as Latest by user search SourcetypeUsed IndexUsed
| convert ctime(Latest)
0 Karma
1 Solution

MuS
Legend

Hi splunkclarium,

I usually use something like this to get the search.mode :

index=_internal sourcetype=splunkd_ui_access q!="" 
| rex field=uri_query "display\.page\.search\.mode=(?<search_mode>[^\&]+)" 
| table _time host user q search_mode 
| eval q=urldecode(q)

Hope this helps ...

cheers, MuS

View solution in original post

amounika
New Member

The accepted query is not working all the time. In certain internal logs for few user searches we doesn't have "q" field in the logs and search mode field is also not defined.

By using restAPI we are able to check the saved search result and user activity but it is server specific.

Could you provide a way to track each user's search and the mode of search(In particular Verbose) and the query ran for a particular peroid for a clustered envirnoment.

0 Karma

MuS
Legend

Hi splunkclarium,

I usually use something like this to get the search.mode :

index=_internal sourcetype=splunkd_ui_access q!="" 
| rex field=uri_query "display\.page\.search\.mode=(?<search_mode>[^\&]+)" 
| table _time host user q search_mode 
| eval q=urldecode(q)

Hope this helps ...

cheers, MuS

splunkclarium
New Member

It did. THanks!!

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...