Activity Feed
- Got Karma for Re: How to save memory and ignore table row where column value is less than x?. 08-26-2022 09:36 AM
- Posted Re: How to save memory and ignore table row where column value is less than x? on Splunk Search. 08-26-2022 08:54 AM
- Tagged Re: How to save memory and ignore table row where column value is less than x? on Splunk Search. 08-26-2022 08:54 AM
- Posted Re: How to save memory and ignore table row where column value is less than x? on Splunk Search. 08-26-2022 08:48 AM
- Karma Re: How to save memory and ignore table row where column value is less than x? for richgalloway. 08-26-2022 08:45 AM
- Karma Re: Replace string if preceded or followed by particular characters? for gcusello. 08-22-2022 01:57 PM
- Karma Re: How. to replace string if preceded or followed by particular characters? for ITWhisperer. 08-22-2022 01:57 PM
- Posted How to save memory and ignore table row where column value is less than x? on Splunk Search. 08-22-2022 11:34 AM
- Posted Re: How. to replace string if preceded or followed by particular characters? on Splunk Search. 08-22-2022 09:37 AM
- Posted How. to replace string if preceded or followed by particular characters? on Splunk Search. 08-22-2022 07:56 AM
- Karma Re: How to use timestamp as x axis in chart? for isoutamo. 08-18-2022 11:05 AM
- Posted How to use timestamp as x axis in chart? on Splunk Search. 08-17-2022 10:34 AM
- Karma Re: Display a graph with search for richgalloway. 08-16-2022 05:24 PM
- Posted How do I Display a graph with search? on Splunk Search. 08-16-2022 04:48 PM
- Karma Re: Trouble showing a new field in a table for ITWhisperer. 08-05-2022 07:07 AM
- Posted Why won't this table show new field names? on Splunk Search. 08-05-2022 07:00 AM
- Karma Re: What does ns mean in a metric such as spans.duration.ns.p90? for richgalloway. 08-04-2022 08:11 AM
- Posted What does ns mean in a metric such as spans.duration.ns.p90? on Splunk Observability Cloud. 08-04-2022 07:50 AM
- Posted Why do Splunk Observability data values change when time range changes? on Splunk Observability Cloud. 08-03-2022 09:12 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
08-26-2022
08:54 AM
1 Karma
The line below helped in limiting the number of rows in the table. | where frequency > 1000 However, this line below did not seem to impact memory usage. | fields _raw - * I chose to add an extra search parameter. This seemed to reduce memory usage. Instead of this: index=mock_index source=mock_source I did this: index=mock_index source=mock_source mock_parameter
... View more
- Tags:
- Reply
08-26-2022
08:48 AM
This helped me in limiting the number of rows in the table, but it doesn't seem to impact memory usage. To reduce memory usage, I had to use a more specific search than just: index=mock_index source=mock_source Giving this an extra keyword reduced the memory usage.
... View more
08-22-2022
11:34 AM
I may use a search similar to this:
index=mock_index source=mock_source | eval event = _raw | stats count as frequency by event | table event, frequency
which results in a table similar to the one below:
Event
Frequency
2022-08-22 13:11:12 [stuff] apple.bean.34 [stuff]
2000
2022-08-22 14:18:22 [stuff] apple.bean.86 6 [stuff]
200
2022-08-22 15:17:42 [stuff] apple.bean.1 546 [stuff]
2
Some of the tables which I get from this search give an error that states the search_process_memory_usage_threshold has been exceeded. If I know that I am not interested in rows where the frequency is less than 1,000, is there a way to limit the table so it only shows the rows above 1,000? Would this also improve memory usage?
... View more
08-22-2022
09:37 AM
I think this is almost correct. It doesn't seem to catch the parentheses condition. I've tried to omit a closing parenthesis | rex mode=sed "s/(?<a>\s|\:|\((?<b>\d+)/\1\&/g" However, Splunk will not allow this search without the closing parenthesis. I see how this is used to have "or" conditions, but is it possible to use such conditions to allow the stated parentheses condition?
... View more
08-22-2022
07:56 AM
Given the below example events:
Initial event:
[stuff] apple.bean.carrot2donut.57.egg.fish(10) max:311 min 15 avg 101 low:1[stuff]
Result event 1:
[stuff] apple.bean.carrot&donut.&.egg.fish(&) max:& min & avg & low:&[stuff]
Result event 2:
[stuff] apple.bean.carrot2donut.57.egg.fish(&) max:& min & avg & low:&[stuff]
I want to get Result 2 rather than Result 1. I want to replace any series of numbers with an ampersand only if one of three conditions are true. These conditions:
The number series is preceded by a space.
The number series is preceded by a colon.
The number series is preceded by an open parenthesis and followed by a closed parenthesis.
If I use the replace line below, the new variable created will contain Result 1 rather than the Result 2 I desire.
| eval event = replace(_raw, "[0-9]+", "&")
How do I get Result 2 instead?
... View more
08-17-2022
10:34 AM
Currently I have used a similar query to what is below to plot data on a 24 hour graph.
index=mock_index source=mock_source.log param1 param2 param3 | rex field=_raw "Latency: (?<latency>[0-9]+)" | eval time = mvjoin(mvindex(split(_raw, " "), 0, 1), " ") | eval time = strptime(time, "%Y-%m-%d %H:%M:%S,%3N") | table time, latency
An example event:
2022-08-16 14:04:34,123 INFO [stuff] Latency: 55 [stuff]
Ideally I would like to get latency averages over 5 minute periods, and display the data to a graph where the x-axis labels 30 minute intervals. Given this goal, is strptime() the best way to manage the timestamps in my events?
... View more
Labels
- Labels:
-
timechart
08-16-2022
04:48 PM
My search looks similar to the one below:
index=mock_index source=mock_source.log param1 param2 param3
| rex field=_raw "Latency: (?<latency>[0-9]+)"
| timechart span=5m avg(latency)
An example event:
2022-08-16 14:04:34,123 INFO [stuff] Latency: 55 [stuff] What have I got wrong in my search that it doesn't draw a graph?
... View more
08-05-2022
07:00 AM
Based on what I've studied, I should be able to show a new field named item with a search such as the one below:
index=existing_index | eval item = "apple" | stats count by source | table source, item, count
I would expect output similar to the table below.
source
item
count
a/b/123.log
apple
5
a/c/915.log
apple
6
a/b/574.log
apple
1
Instead, this happens:
source
item
count
a/b/123.log
5
a/c/915.log
6
a/b/574.log
1
Why did I not get what I expected?
... View more
08-04-2022
07:50 AM
First it isn't clear to me what units the various timeseries in a metric are returning. It feels pretty arbitrary to me. I was wondering if perhaps the ns portion of a metric stood for nanoseconds? That would at least make it this more clear. But I suppose it could also stand for namespace.
... View more
Labels
- Labels:
-
Splunk Observability Cloud
08-03-2022
09:12 AM
When using Splunk Observability with the Boutique EKS website, I set up a graph to show data from metric 'spans.duration.ns.p90', sf_service 'checkoutservice', and sf_operation '/grpc.health.v1.Health/Check'. With the time range set at 1 hour, I can observe a particular peak value at 2.2 million. If I change the time range to 2 hours, this same peak value becomes 4.4 million. Why is this data changing?
... View more
Labels
- Labels:
-
Splunk Observability Cloud