All Apps and Add-ons

Comparing Two Searches (WIth Different Search Patterns). Find Difference From First Search

tdotcspot
New Member

Hi there,

I'm having a bit of trouble trying to accomplish this and I'm hoping someone can help. I'm using the AWS add on in Splunk (which grabs CloudTrail logs) and I'm trying to create a search that shows how many EC2 instances are currently active for the day in our environment. My thought process was to 1) find the number of running instances, get the ids 2) get the number of terminated instances, find those ids and 3) compare the two searches and do a one way diff. Iterating thru each id on the 1st search and if they are not found in the ids of the 2nd search, the instance is still running.

First query:

index="cloudtrail" eventName=RunInstances  earliest=-0h@d  | spath output="runningInstances" "responseElements.instancesSet.items{}.instanceId" |table runningInstances

Second query:

 index="*" eventName=TerminateInstances earliest=-0h@d  | spath output="terminatedInstances" "responseElements.instancesSet.items{}.instanceId" |table terminatedInstances

I thought I could use a "|set diff" but don't have a lot of experience with it. I also thought I could also attempt some type of "|foreach" loop within another "|foreach" loop.. but I think I'm making it too complex.

Any help would be greatly appreciated!
Thanks,
T

0 Karma
1 Solution

renjith_nair
Legend

@tdotcspot ,

Try,

  • Get the instances from both eventNames
  • Exclude the instances which are part of both event names(RunInstances and TerminateInstances)
  • Filter running instances.

    index=* (eventName=RunInstances OR eventName=TerminateInstances) earliest=-0h@d
    |spath output="instances" "responseElements.instancesSet.items{}.instanceId" 
    |stats count,values(eventName) as eventNames by instances
    |where mvcount(eventNames ) <2 AND eventNames="RunInstances"
    

OR

  • Get all running instances and filter them if they are found in the terminated instances.

    index="cloudtrail" eventName=RunInstances earliest=-0h@d

    |spath output="instances" "responseElements.instancesSet.items{}.instanceId"|fields instances
    |search NOT [ search index="*" eventName=TerminateInstances earliest=-0h@d

    | spath output="instances" "responseElements.instancesSet.items{}.instanceId" |fields instances]

---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

0 Karma

renjith_nair
Legend

@tdotcspot ,

Try,

  • Get the instances from both eventNames
  • Exclude the instances which are part of both event names(RunInstances and TerminateInstances)
  • Filter running instances.

    index=* (eventName=RunInstances OR eventName=TerminateInstances) earliest=-0h@d
    |spath output="instances" "responseElements.instancesSet.items{}.instanceId" 
    |stats count,values(eventName) as eventNames by instances
    |where mvcount(eventNames ) <2 AND eventNames="RunInstances"
    

OR

  • Get all running instances and filter them if they are found in the terminated instances.

    index="cloudtrail" eventName=RunInstances earliest=-0h@d

    |spath output="instances" "responseElements.instancesSet.items{}.instanceId"|fields instances
    |search NOT [ search index="*" eventName=TerminateInstances earliest=-0h@d

    | spath output="instances" "responseElements.instancesSet.items{}.instanceId" |fields instances]

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...