Splunk Search

Tail and head commands for two different values on same field

Explorer

Hi Experts,

I have a requirement. I have a field called 'exception' and it has two values. one as 'open file' and another one is 'half open file'.
Exceptions starts with 'half open file' and these events are typically more than 50 and then follows with 'open file'
and this count might be anything more than 100. This count is in just span of 5mins.
Now, my requirement is to display both values for 'open file' and 'half open file'. My output rows should be exactly 10 rows.
'half open file' events should be displayed with tail 5 and 'open file' should display with head 5.
That equals both count to 10 events.

0 Karma

Esteemed Legend

Like this

| makeresults count=50 | eval exception="open file"
| streamstats count AS _time
| append [| makeresults count=100 | eval exception="half open file"| streamstats count AS _time
| eval _time = _time + _time % 2]
| sort 0 - _time

| rename COMMENT AS "Everything above generates sample event data; everything below is your solution"

| multireport [ search exception="half open file" | head 5 ] [ search exception="open file" | tail 5 ]
0 Karma

Explorer

Hi Wood,
Thanks for looking into it. The count which i have mntioned 50 and 100 are not fixed. Hence, i don't want to use makeresults and also i have a search query to catch the exception. I made changes to your query according to my requirement but seems it is not working. It is not producing exactly 10 events.

0 Karma

Esteemed Legend

My solution is to add the last line to your existing search. Did you do that? The other stuff is there to PROVE that the last line works (it does).

0 Karma
Don’t Miss Global Splunk
User Groups Week!

Free LIVE events worldwide 2/8-2/12
Connect, learn, and collect rad prizes
and swag!