All Apps and Add-ons

Comparing Two Searches (WIth Different Search Patterns). Find Difference From First Search

tdotcspot
New Member

Hi there,

I'm having a bit of trouble trying to accomplish this and I'm hoping someone can help. I'm using the AWS add on in Splunk (which grabs CloudTrail logs) and I'm trying to create a search that shows how many EC2 instances are currently active for the day in our environment. My thought process was to 1) find the number of running instances, get the ids 2) get the number of terminated instances, find those ids and 3) compare the two searches and do a one way diff. Iterating thru each id on the 1st search and if they are not found in the ids of the 2nd search, the instance is still running.

First query:

index="cloudtrail" eventName=RunInstances  earliest=-0h@d  | spath output="runningInstances" "responseElements.instancesSet.items{}.instanceId" |table runningInstances

Second query:

 index="*" eventName=TerminateInstances earliest=-0h@d  | spath output="terminatedInstances" "responseElements.instancesSet.items{}.instanceId" |table terminatedInstances

I thought I could use a "|set diff" but don't have a lot of experience with it. I also thought I could also attempt some type of "|foreach" loop within another "|foreach" loop.. but I think I'm making it too complex.

Any help would be greatly appreciated!
Thanks,
T

0 Karma
1 Solution

renjith_nair
Legend

@tdotcspot ,

Try,

  • Get the instances from both eventNames
  • Exclude the instances which are part of both event names(RunInstances and TerminateInstances)
  • Filter running instances.

    index=* (eventName=RunInstances OR eventName=TerminateInstances) earliest=-0h@d
    |spath output="instances" "responseElements.instancesSet.items{}.instanceId" 
    |stats count,values(eventName) as eventNames by instances
    |where mvcount(eventNames ) <2 AND eventNames="RunInstances"
    

OR

  • Get all running instances and filter them if they are found in the terminated instances.

    index="cloudtrail" eventName=RunInstances earliest=-0h@d

    |spath output="instances" "responseElements.instancesSet.items{}.instanceId"|fields instances
    |search NOT [ search index="*" eventName=TerminateInstances earliest=-0h@d

    | spath output="instances" "responseElements.instancesSet.items{}.instanceId" |fields instances]

Happy Splunking!

View solution in original post

0 Karma

renjith_nair
Legend

@tdotcspot ,

Try,

  • Get the instances from both eventNames
  • Exclude the instances which are part of both event names(RunInstances and TerminateInstances)
  • Filter running instances.

    index=* (eventName=RunInstances OR eventName=TerminateInstances) earliest=-0h@d
    |spath output="instances" "responseElements.instancesSet.items{}.instanceId" 
    |stats count,values(eventName) as eventNames by instances
    |where mvcount(eventNames ) <2 AND eventNames="RunInstances"
    

OR

  • Get all running instances and filter them if they are found in the terminated instances.

    index="cloudtrail" eventName=RunInstances earliest=-0h@d

    |spath output="instances" "responseElements.instancesSet.items{}.instanceId"|fields instances
    |search NOT [ search index="*" eventName=TerminateInstances earliest=-0h@d

    | spath output="instances" "responseElements.instancesSet.items{}.instanceId" |fields instances]

Happy Splunking!
0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...