Splunk Search

How to use index time to search the data to avoid skipped searches etc?

mohammadsharukh
Path Finder

Dear All,

 

I was going through a Splunk conf 21 where the narrator explained to use the index time instead of search time using a Macro

Out of curiosity, I went to understand the query and have the following doubts:-

1) In row 5 of the query, What is "default start lookback" & "longest lookback" and from where they getting the value?

2) In row 6 of the query, What is "realtime lag" &" longest query" and from where they getting the value?

3) What is the concept of row 8? how the search is working?

4) What does row 14 mean? what is 1=2?

Please find below the splunk query

mohammadsharukh_0-1693116170225.png

 

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

All of the variables surrounded by '$' (like $overlap$) are tokens.  Tokens are set in the <input> section of a dashboard or are the results of other dashboard panels.  They also can be passed in from another dashboard.  Perhaps an earlier part of the talk describes this.

Line 8 is not performing a search - it's just building a search string using a combination of string literals and fields connected with the concatenation (.) operator.

Line 14 only passes events where 1=2, which is a way of ensuring the subsearch returns no results.  IOW, it makes the outputlookup command silent.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

All of the variables surrounded by '$' (like $overlap$) are tokens.  Tokens are set in the <input> section of a dashboard or are the results of other dashboard panels.  They also can be passed in from another dashboard.  Perhaps an earlier part of the talk describes this.

Line 8 is not performing a search - it's just building a search string using a combination of string literals and fields connected with the concatenation (.) operator.

Line 14 only passes events where 1=2, which is a way of ensuring the subsearch returns no results.  IOW, it makes the outputlookup command silent.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...