Splunk Search

How to get only active hosts?

Stephcg
Explorer

I have an application that have some instances/hosts. Because of change of throughput or instability new instances/hosts can be initiated and old can be terminated.
There are many different events/logs being registered. 

When a new instance/host is initiated it shows the following event/log:

1/20/23
6:00:01.256 PM
 
[app=gateway-example-app, traceId=, spanId=, INFO 1 [ main] gateway.GatewayApplicationKt : Started GatewayApplicationKt in 21.081 seconds (JVM running for 48.641)
  • host = ip-example-of-ip-01
  • source = http:source-example
  • sourcetype = example-sourcetype 

 

When an instance is terminated, it shows the following log:

1/20/23
3:53:42.778 PM
 
CoreServiceImpl INFO: JVM is shutting down
  • host = ip-example-of-ip-02
  • source = http:source-example
  • sourcetype = example-sourcetype 



Is there a way of getting a list of hosts that have the log of initialization, but don't have the log of termination? 
In other words, a list of currently active hosts?

Thank you for any help in advance. And sorry if I wrote anything wrong, english is not my main language.

0 Karma
1 Solution

scelikok
SplunkTrust
SplunkTrust

Hi @Stephcg,

There are other ways but the below should work for your case;

index=application source=http:source-example sourcetype=example-sourcetype ("is shutting down" OR "Started") 
| dedup host 
| search "Started"
| table _time host

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.

View solution in original post

scelikok
SplunkTrust
SplunkTrust

Hi @Stephcg,

There are other ways but the below should work for your case;

index=application source=http:source-example sourcetype=example-sourcetype ("is shutting down" OR "Started") 
| dedup host 
| search "Started"
| table _time host

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.

Stephcg
Explorer

That worked perfectly! Thank you so much for the help!

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...