Hello Everyone, I have built a Splunk query (shared below) recently & I noticed that when apply search condition App_Name IN (*) its actually drop number of event scanned. Like if I execute following query it has 2515 events (not to confused with statistics)...
index=msad_hcv NOT ("forwarded") | spath output=role_name path=auth.metadata.role_name
| mvexpand role_name
| rex field=role_name "(\w+-(?P<App_Name>[^\"]+))"
| search Environment=* type=* request.path=* App_Name IN (*)
| stats count
But in case I comment App_Name IN (*) condition in line no. 4 then it produced 4547 events.
index=msad_hcv NOT ("forwarded") | spath output=role_name path=auth.metadata.role_name
| mvexpand role_name
| rex field=role_name "(\w+-(?P<App_Name>[^\"]+))"
| search Environment=* type=* request.path=* ```App_Name IN (*)```
| stats count
My question is how can I save the log events from getting dropped when App_Name IN (*) is in force ? Please note that events which are being dropped, are the ones who don't have "App_Name" in their events.
... View more