Splunk Search

How to replace subsearch to achieve the same result?

peterfox1992
Explorer

Hi Folks,

I'm using a query like below. But since subsearch returns more than 10K events, I'm not getting the expected result.

Can someone advise me if there is an alternate way to replace subsearch and to achieve the expected result?

index="foo" sourcetype="xyz" user!="abc" method=POST (url="*search*aspx*" AND code!=302 AND code!=304 AND code!=401 AND code!=403 AND code!=0) [search index="foo" method_name=pqr message="*Response Time for method pqr*" | fields uniqid]
| eval hour=strftime(_time,"%H") | where hour >=7 AND hour <=19
| timechart span=1d count(eval(time_took)) as Total , count(eval(time_took<2000)) as Success, count(eval(time_took>2000)) as misses | sort by "_time" desc

Thanks in advance for the help.

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Try it like this

index="foo" (sourcetype="xyz" user!="abc" method=POST (url="*search*aspx*" AND code!=302 AND code!=304 AND code!=401 AND code!=403 AND code!=0)) OR (method_name=pqr message="*Response Time for method pqr*")
| eval filterer=if(match(method_name,"pqr") AND match(message,"Response Time for method pqr"),1,null())
| eventstats values(filterer) as filtered by uniqid
| where filtered=1 AND isnull(filterer)
| eval hour=strftime(_time,"%H") | where hour >=7 AND hour <=19
| timechart span=1d count(eval(time_took)) as Total , count(eval(time_took<2000)) as Success, count(eval(time_took>2000)) as misses | sort by "_time" desc

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Try something like this:

index="foo" (sourcetype="xyz" user!="abc" method=POST (url="*search*aspx*" AND code!=302 AND code!=304 AND code!=401 AND code!=403 AND code!=0) OR (method_name=pqr message="*Response Time for method pqr*")
| eval filterer=if(searchmatch(method_name=pqr) AND searchmatch(message="*Response Time for method pqr*"),1,null())
| eventstats values(filterer) as filtered by uniqid
| where filtered=1 AND isnull(filterer)
| eval hour=strftime(_time,"%H") | where hour >=7 AND hour <=19
| timechart span=1d count(eval(time_took)) as Total , count(eval(time_took<2000)) as Success, count(eval(time_took>2000)) as misses | sort by "_time" desc
0 Karma

peterfox1992
Explorer

Thanks @ITWhisperer for the reply.

I noticed few issues while running the query.

i) Open bracket before sourcetype="xyz" May I know where should I need to close the bracket.

(sourcetype="xyz" 

 

Also getting below error in the eval command.

Error in 'eval' command: The arguments to the 'searchmatch' function are invalid.

Thanks once again.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try it like this

index="foo" (sourcetype="xyz" user!="abc" method=POST (url="*search*aspx*" AND code!=302 AND code!=304 AND code!=401 AND code!=403 AND code!=0)) OR (method_name=pqr message="*Response Time for method pqr*")
| eval filterer=if(match(method_name,"pqr") AND match(message,"Response Time for method pqr"),1,null())
| eventstats values(filterer) as filtered by uniqid
| where filtered=1 AND isnull(filterer)
| eval hour=strftime(_time,"%H") | where hour >=7 AND hour <=19
| timechart span=1d count(eval(time_took)) as Total , count(eval(time_took<2000)) as Success, count(eval(time_took>2000)) as misses | sort by "_time" desc

peterfox1992
Explorer

Thanks @ITWhisperer , I tried but once again an error in eval.

Error in 'eval' command: Regex: quantifier does not follow a repeatable item

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What exactly do you have in your eval command?

0 Karma

peterfox1992
Explorer

This is the exact eval command which I'm using.

eval filterer=if(match(method_name,"pqr") AND match(message,"*Response Time for pqr*"),1,null())

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Remove the * from the beginning and end of the match string (as I showed in my example!)

peterfox1992
Explorer

Thanks a lot @ITWhisperer 

It worked 🙂 Much Appreciate for you patience and guidance. Cheers!

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Take Action Automatically on Splunk Alerts with Red Hat Ansible Automation Platform

 Are you ready to revolutionize your IT operations? As digital transformation accelerates, the demand for ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...