Reputation: 283
I have some general queries on Splunk, as no one on my team has deep technical knowledge & I've never used it before, appreciate anyone's help on this, thanks
I have the following Splunk query
(host = "A" OR host = "B" OR host = "C" OR host = "D" OR host = "E" OR host = "F" OR host = "G" OR host = "H")
AND source = "logs/BAU.log"
| transaction submission_id startswith="ABC Logic begins" endswith="ABC Logic ended"
| eval group = case(host IN ("A", "B", "C", "D"), "Primary",
host IN ("E", "F", "G", "H"), "Secondary")
| chart dc(submission_id) by group
If process ABC fails, the log "ABC Logic ended" will not be displayed, instead "ABC Logic failed" is logged.
In the following log example, will my query return a count of 2 or 3?
INFO [BkndDriver]--[submission_id=1] ABC Logic begins
...
INFO [BkndDriver]--[submission_id=1] ABC Logic failed
...
...
...
INFO [BkndDriver]--[submission_id=2] ABC Logic begins
...
INFO [BkndDriver]--[submission_id=2] ABC Logic ended
...
...
INFO [BkndDriver]--[submission_id=3] ABC Logic begins
...
INFO [BkndDriver]--[submission_id=3] ABC Logic ended
We are experiencing some inaccuracies with the total count of calls made to the ABC service, I am trying to troubleshoot what may be causing the mismatch in the total count.
Because I've structured my query to look for the specific strings "ABC Logic begins" & "ABC Logic ended", I'm not sure if I should change the query to use a different command?
Upvotes: 0
Views: 123