Splunk Search

How to replace subsearch to achieve the same result?

peterfox1992
Explorer

Hi Folks,

I'm using a query like below. But since subsearch returns more than 10K events, I'm not getting the expected result.

Can someone advise me if there is an alternate way to replace subsearch and to achieve the expected result?

index="foo" sourcetype="xyz" user!="abc" method=POST (url="*search*aspx*" AND code!=302 AND code!=304 AND code!=401 AND code!=403 AND code!=0) [search index="foo" method_name=pqr message="*Response Time for method pqr*" | fields uniqid]
| eval hour=strftime(_time,"%H") | where hour >=7 AND hour <=19
| timechart span=1d count(eval(time_took)) as Total , count(eval(time_took<2000)) as Success, count(eval(time_took>2000)) as misses | sort by "_time" desc

Thanks in advance for the help.

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Try it like this

index="foo" (sourcetype="xyz" user!="abc" method=POST (url="*search*aspx*" AND code!=302 AND code!=304 AND code!=401 AND code!=403 AND code!=0)) OR (method_name=pqr message="*Response Time for method pqr*")
| eval filterer=if(match(method_name,"pqr") AND match(message,"Response Time for method pqr"),1,null())
| eventstats values(filterer) as filtered by uniqid
| where filtered=1 AND isnull(filterer)
| eval hour=strftime(_time,"%H") | where hour >=7 AND hour <=19
| timechart span=1d count(eval(time_took)) as Total , count(eval(time_took<2000)) as Success, count(eval(time_took>2000)) as misses | sort by "_time" desc

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Try something like this:

index="foo" (sourcetype="xyz" user!="abc" method=POST (url="*search*aspx*" AND code!=302 AND code!=304 AND code!=401 AND code!=403 AND code!=0) OR (method_name=pqr message="*Response Time for method pqr*")
| eval filterer=if(searchmatch(method_name=pqr) AND searchmatch(message="*Response Time for method pqr*"),1,null())
| eventstats values(filterer) as filtered by uniqid
| where filtered=1 AND isnull(filterer)
| eval hour=strftime(_time,"%H") | where hour >=7 AND hour <=19
| timechart span=1d count(eval(time_took)) as Total , count(eval(time_took<2000)) as Success, count(eval(time_took>2000)) as misses | sort by "_time" desc
0 Karma

peterfox1992
Explorer

Thanks @ITWhisperer for the reply.

I noticed few issues while running the query.

i) Open bracket before sourcetype="xyz" May I know where should I need to close the bracket.

(sourcetype="xyz" 

 

Also getting below error in the eval command.

Error in 'eval' command: The arguments to the 'searchmatch' function are invalid.

Thanks once again.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try it like this

index="foo" (sourcetype="xyz" user!="abc" method=POST (url="*search*aspx*" AND code!=302 AND code!=304 AND code!=401 AND code!=403 AND code!=0)) OR (method_name=pqr message="*Response Time for method pqr*")
| eval filterer=if(match(method_name,"pqr") AND match(message,"Response Time for method pqr"),1,null())
| eventstats values(filterer) as filtered by uniqid
| where filtered=1 AND isnull(filterer)
| eval hour=strftime(_time,"%H") | where hour >=7 AND hour <=19
| timechart span=1d count(eval(time_took)) as Total , count(eval(time_took<2000)) as Success, count(eval(time_took>2000)) as misses | sort by "_time" desc

peterfox1992
Explorer

Thanks @ITWhisperer , I tried but once again an error in eval.

Error in 'eval' command: Regex: quantifier does not follow a repeatable item

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What exactly do you have in your eval command?

0 Karma

peterfox1992
Explorer

This is the exact eval command which I'm using.

eval filterer=if(match(method_name,"pqr") AND match(message,"*Response Time for pqr*"),1,null())

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Remove the * from the beginning and end of the match string (as I showed in my example!)

peterfox1992
Explorer

Thanks a lot @ITWhisperer 

It worked 🙂 Much Appreciate for you patience and guidance. Cheers!

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...