Splunk Search

how do I tell how often real-time searches are run?

cphair
Builder

Hello. I'm considering disabling real-time searches for my app, but first I'd like to know whether they're being used at all. Is there a way to see what time ranges have been chosen for recent searches? searches.log only has the search string itself, and SoS doesn't seem to have a useful view for this.

0 Karma
1 Solution

MuS
Legend

Hi cphair,

you can run this search

 index=_internal source="*metrics.log" group=realtime_search_data | timechart count by sid usenull=f useother=f

to get an overview if there are real-time searches run at all over the last 30 days (default retention for index _internal).
By the way, the user role does not have the rtsearch capabilities by default.

hope this helps ...

cheers, MuS

View solution in original post

MuS
Legend

Hi cphair,

you can run this search

 index=_internal source="*metrics.log" group=realtime_search_data | timechart count by sid usenull=f useother=f

to get an overview if there are real-time searches run at all over the last 30 days (default retention for index _internal).
By the way, the user role does not have the rtsearch capabilities by default.

hope this helps ...

cheers, MuS

cphair
Builder

Cool. Thank you.

0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...