Splunk Search

Event logs to metric conversion using scheduled search

anand_p
Engager

We have got a requirement where, event logs need to be indexed under a metrics index. For this we are using mcollect command to ingest during search time.

For automatic conversion, we have scheduled a search to run every 1 hour, but in case of missed schedule data is lost for that schedule. 

What is the best way to store the last indexed time and run the schedule based on the last indexed time?

 

 

Note: In long run we will be using LogToMetrics sourcetype for conversion, Until then we need to use the mcollect command.

Labels (2)
0 Karma
Get Updates on the Splunk Community!

Fall Into Learning with New Splunk Education Courses

Every month, Splunk Education releases new courses to help you branch out, strengthen your data science roots, ...

Super Optimize your Splunk Stats Searches: Unlocking the Power of tstats, TERM, and ...

By Martin Hettervik, Senior Consultant and Team Leader at Accelerate at Iver, Splunk MVPThe stats command is ...

How Splunk Observability Cloud Prevented a Major Payment Crisis in Minutes

Your bank's payment processing system is humming along during a busy afternoon, handling millions in hourly ...