Splunk Search

What is the SPL for cancelled / timed out searches?

McMac84
Engager

Hi everyone, I've a scenario where Splunk is timing out in querying customer SIEM environments and reporting as potential dropped logs.

If I check in the customer's SIEM, I see that there are no dropped logs, so I know the issue is to do with Splunk querying their environment. 

Knowing that, I am trying to craft an SPL that looks for searches that were canceled or timed out. Can someone help me with this?

What I've tried using is below but it's not accurately correlating to the time stamps I am seeing in the ticket for my customer.

Can someone help me build this out more.

 

index=<customer name> cancelled

 

Labels (2)
Tags (2)
0 Karma

danspav
SplunkTrust
SplunkTrust

Hi @McMac84,

Running searches are all logged to the _audit index - you can get details on cancelled searches there:

 

index=_audit action=search info IN("cancel","cancelled")
| timechart span=15m count by user limit=15

 

I believe "cancel" is system-cancelled, and "cancelled" is user-cancelled, but that's just my guess based on this docs page.


Cheers,
Daniel

 

0 Karma

isoutamo
SplunkTrust
SplunkTrust

You could/should use MC on splunk. There is dashboards where you could look skipped and deferred searches.

Settings -> MC

Search -> Scheduler Activity -> Instance or Deployment based on your system

0 Karma
Get Updates on the Splunk Community!

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...

Splunk App Dev Community Updates – What’s New and What’s Next

Welcome to your go-to roundup of everything happening in the Splunk App Dev Community! Whether you're building ...

The Latest Cisco Integrations With Splunk Platform!

Join us for an exciting tech talk where we’ll explore the latest integrations in Cisco &#43; Splunk! We’ve ...