Skip to content

Commit 6d9bca6

Browse files
authored
Update savedsearches.conf
1 parent 7d57652 commit 6d9bca6

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

default/savedsearches.conf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5355,7 +5355,7 @@ request.ui_dispatch_app = SplunkAdmins
53555355
request.ui_dispatch_view = search
53565356
search = ```Attempt to gather stats from the remote_searches log on the indexing tier relating to the searches from various search heads. These may include search heads where we do not see the _audit index. Added regex to ignore the strange presummarize that comes in from search heads that do not have accelerated reports...``` \
53575357
index=_internal `indexerhosts` sourcetype=splunkd_remote_searches source="/opt/splunk/var/log/splunk/remote_searches.log" terminated: OR closed: ```Note that TERM(starting) has the apiStartTime, apiEndTime stats, but lacks the useful stats from a search that is complete. Also note that on indexers scan_count=events_count (in my testing). Finally various fields failed to auto-extract so regexes are used now, perhaps due to the length of some searches...``` \
5358-
| rex "(?s) elapsedTime=(?P<elapsedTime>[0-9\.]+), search='(?P<search>.*?)(', savedsearch_name|\", drop_count=\d+)" \
5358+
| rex "(?s) elapsedTime=(?P<elapsedTime>[0-9\.]+),( cpuTime=\S+,)? search='(?P<search>.*?)(', savedsearch_name|\", drop_count=\d+)" \
53595359
| regex search!="^(pretypeahead|copybuckets)" \
53605360
| regex search!="^presummarize (tstats=t maintain=\"\" summaryprefix=\"[^\"]+\"|maintain=\"%22SUMMARY_ID%22%2C%22EARLIEST_TIME%22%2C%22REMOTE_SEARCH%22%2C%22NORM_SUMMARY_ID%22%2C%22NORM_REMOTE_SEARCH%22%0A\" summaryprefix=\"[^\"]+\")\s*$" \
53615361
| rex "drop_count=[0-9]+, scan_count=(?P<scan_count>[0-9]+)" \
@@ -5393,7 +5393,7 @@ request.ui_dispatch_app = SplunkAdmins
53935393
request.ui_dispatch_view = search
53945394
search = ```Attempt to determine index access via the remote_searches.log file, useful for when you cannot see the audit logs of all incoming search heads```\
53955395
index=_internal sourcetype=splunkd_remote_searches source="/opt/splunk/var/log/splunk/remote_searches.log" terminated: OR closed: ```Note that TERM(starting) has the apiStartTime, apiEndTime stats, but lacks the useful stats from a search that is complete. Also note that on indexers scan_count=events_count (in my testing). Finally the elapsedTime sometimes failed to auto-extract, perhaps due to length...``` \
5396-
| rex "(?s) elapsedTime=(?P<elapsedTime>[0-9\.]+), search='(?P<search>.*?)(', savedsearch_name|\", drop_count=\d+)" \
5396+
| rex "(?s) elapsedTime=(?P<elapsedTime>[0-9\.]+),( cpuTime=\S+,)? search='(?P<search>.*?)(', savedsearch_name|\", drop_count=\d+)" \
53975397
| regex search!="^(pretypeahead|copybuckets)" \
53985398
| rex "drop_count=[0-9]+, scan_count=(?P<scan_count>[0-9]+)" \
53995399
| rex "total_slices=[0-9]+, considered_buckets=(?P<considered_count>[0-9]+)" \
@@ -6207,7 +6207,7 @@ request.ui_dispatch_view = search
62076207
search = ```This warning when occurring repetitively tends to indicate some kind of issue that will require the file to be manually removed. For example a zero sized metadata file that cannot be reaped by the dispatch reaper``` \
62086208
index=_internal `indexerhosts` source=*remote_searches.log terminated: OR closed: \
62096209
| regex search!="^(pretypeahead|copybuckets)" \
6210-
| rex "(?s) elapsedTime=(?P<elapsedTime>[0-9\.]+), search='(?P<search>.*?)(', savedsearch_name|\", drop_count=\d+)" \
6210+
| rex "(?s) elapsedTime=(?P<elapsedTime>[0-9\.]+),( cpuTime=\S+,)? search='(?P<search>.*?)(', savedsearch_name|\", drop_count=\d+)" \
62116211
| rex "(terminated|closed): search_id=(?P<search_id>[^,]+)" \
62126212
| regex search="^(litsearch|mcatalog|mstats|mlitsearch|litmstats|tstats|presummarize)" \
62136213
| regex search_id="^remote" \
@@ -6667,7 +6667,7 @@ request.ui_dispatch_app = SplunkAdmins
66676667
request.ui_dispatch_view = search
66686668
search = ```Attempt to determine index access via the remote_searches.log file, useful for when you cannot see the audit logs of all incoming search heads. This version looks for wildcards and it is not expected to be super-accurate, as while we can determine the incoming server, and sometimes the incoming user from the search id we cannot accurately determine the roles of the user without building yet more lookups and complexity. Therefore this search exists only to roughly summarize if an index was ever accessed via wildcards or not at the indexing tier``` \
66696669
index=_internal sourcetype=splunkd_remote_searches source="/opt/splunk/var/log/splunk/remote_searches.log" terminated: OR closed: ```Note that TERM(starting) has the apiStartTime, apiEndTime stats, but lacks the useful stats from a search that is complete. Also note that on indexers scan_count=events_count (in my testing). Finally the elapsedTime sometimes failed to auto-extract, perhaps due to length...``` \
6670-
| rex "(?s) elapsedTime=(?P<elapsedTime>[0-9\.]+), search='(?P<search>.*?)(', savedsearch_name|\", drop_count=\d+)" \
6670+
| rex "(?s) elapsedTime=(?P<elapsedTime>[0-9\.]+),( cpuTime=\S+,)? search='(?P<search>.*?)(', savedsearch_name|\", drop_count=\d+)" \
66716671
| regex search!="^(pretypeahead|copybuckets)" \
66726672
| rex "drop_count=[0-9]+, scan_count=(?P<scan_count>[0-9]+)" \
66736673
| rex "total_slices=[0-9]+, considered_buckets=(?P<considered_count>[0-9]+)" \

0 commit comments

Comments
 (0)