Splunk Search

Display the Results of Search Query at regular intervals of time with fixed start DateTime

boppana
New Member

Hi ,
Currently am running below SPlunk Search Query where am using earliest=-0d@d latest=-2m.

earliest=-0d@d latest=-2m | spath message | rex field=message "TradeID = (?\w+)" | dedup 1 id sortby -_time |timechart count

But My requirement is to run the above search Query for every 10 mins interval where earliest=-0d@d is always fixed and the latest is the time when we are running this search Query I.e for every 10 mins and display the result of that Query at each 10 mins as chart.

Tags (1)
0 Karma

woodcock
Esteemed Legend

Upon further reflection, you should skip using earliest and latest entirely and just use the Today value from the Timepicker!

0 Karma

woodcock
Esteemed Legend

Use this cron:

*/10 * * * *

And this search time specifier:

earliest=@d latest=@min
0 Karma

niketn
Legend

@boppana if your earliest time is always static to the beginning of the day. Do you need to just bucket the count every 10 minutes?

<yourCurrentSearch>
|timechart span=10m count
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

boppana
New Member

Am not sure what is bucket means, but let me explain my requirement in simple text with examples.

I have a search Query, I want to run this for every 10 mins

Example:

Step1: At 00:10 my search Query should run(here it should search logs from 00:00 to 00:10)--suppose we have 10 count
Step-2: Again at 00:20 my search Query should run (here it should search logs for given search pattern from 00:00 to 00:20)

Like this Query should run for every 10 mins and I want form chart with the count results from 00:00 to current time.

Note: In Step 2 the count can increase or decrease from 10, becoz by 00:10 we have 10 count but after 00:10 there mi8 be chance that among those 10 count some mi8 not continue the same pattern.

Example: At 00:10 , we have 10 active threads, again if I run that Query at 00:20 some of active threads(lets suppose 4) from 10 might be killed.So we have 6 active threads are there and also from 00:10 to 00:20 we have 2 more active threads added So when I run the Search from 00:00 to 00:20 Search apttern should return count as 8.

0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...

Observability | Use Synthetic Monitoring for Website Metadata Verification

If you are on Splunk Observability Cloud, you may already have Synthetic Monitoringin your observability ...

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...