Splunk Enterprise

Search query issue on cluster environment

AKG1_old1
Builder

Hello,

I am running a search query on search head and getting below errors. When I am running same query in another environment (single node installation) its working fine.  Is there a way to fix this query. 

Both machines are indexers 

  • [hp924srv] Field 'x' does not exist in the data.
  • [hp925srv] Field 'x' does not exist in the data.

Query:

 

 

| tstats summariesonly=false  avg(All_TPS_Logs.duration) AS average, count(All_TPS_Logs.duration) AS count, stdev(All_TPS_Logs.duration) AS stdev, median(All_TPS_Logs.duration) AS median, exactperc75(All_TPS_Logs.duration) AS perc75, exactperc95(All_TPS_Logs.duration) AS perc95, exactperc99.5(All_TPS_Logs.duration) AS perc99.5, min(All_TPS_Logs.duration) AS min, max(All_TPS_Logs.duration) AS max,earliest(_time) as start, latest(_time) as stop 
FROM datamodel=TPS_V7 
WHERE (nodename=All_TPS_Logs host=AMBER_PSC47 All_TPS_Logs.duration <= 1000000000000 All_TPS_Logs.duration >= -10000000 (All_TPS_Logs.user=* OR NOT All_TPS_Logs.user=*) All_TPS_Logs.operationIdentity="*") NOT All_TPS_Logs.overflow=true 
GROUPBY All_TPS_Logs.fullyQualifiedMethod 
| rename All_TPS_Logs.fullyQualifiedMethod as fullyQualifiedMethod  
|eval time_slice_per_min = (stop-start)/60 
| eval Throughput_per_minute=count/time_slice_per_min 
| eval Throughput_per_second=count/(stop-start)
| append [ tstats summariesonly=false avg(All_TPS_Logs.duration) AS average, count(All_TPS_Logs.duration) AS count, stdev(All_TPS_Logs.duration) AS stdev, median(All_TPS_Logs.duration) AS median , exactperc75(All_TPS_Logs.duration) AS perc75 , exactperc95(All_TPS_Logs.duration) AS perc95, exactperc99.5(All_TPS_Logs.duration) AS perc99.5, min(All_TPS_Logs.duration) AS min, max(All_TPS_Logs.duration) AS max,earliest(_time) as start, latest(_time) as stop 
FROM datamodel=TPS_V7 
WHERE (nodename=All_TPS_Logs host=AMBER_PSC47 All_TPS_Logs.duration <= 1000000000000 All_TPS_Logs.duration >= -10000000 All_TPS_Logs.overflow=true (All_TPS_Logs.user=* OR NOT All_TPS_Logs.user=*) All_TPS_Logs.operationIdentity="*" ) 
GROUPBY All_TPS_Logs.fullyQualifiedMethod 
| rename All_TPS_Logs.fullyQualifiedMethod  as fullyQualifiedMethod 
|eval fullyQualifiedMethod = fullyQualifiedMethod." (overflow)" 
| eval time_slice_per_min = (stop-start)/60 
| eval Throughput_per_minute= count/time_slice_per_min
| eval Throughput_per_second=count/(stop-start) ] 
| eval average = round(average, 1) 
| eval stdev = round(stdev, 1) 
| sort - average

 

 

 

 

2020-11-30 14_44_20-Search _ Splunk 8.1.0.png

 

 

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Using Machine Learning for Hunting Security Threats

WATCH NOW Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more for ...

Observability Newsletter Highlights | March 2023

 March 2023 | Check out the latest and greatestSplunk APM's New Tag Filter ExperienceSplunk APM has updated ...

Security Newsletter Updates | March 2023

 March 2023 | Check out the latest and greatestUnify Your Security Operations with Splunk Mission Control The ...