<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Searching for data from different log files with similar field names in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-data-from-different-log-files-with-similar-field/m-p/554049#M157285</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6367"&gt;@bowesmana&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the advice! Yes I've actually been doing quite a bit of 'unstructured' learning, hopping here and there and also viewing youtube tutorials... I guess I was speeding thru the search fundamentals and missed out some essentials. I was able to create my own Splunk app to ingest some logs but realized I didn't fully understand some of the basics which were crucial for analysis.&lt;/P&gt;&lt;P&gt;Thanks once again for the links!&lt;/P&gt;</description>
    <pubDate>Wed, 02 Jun 2021 06:39:23 GMT</pubDate>
    <dc:creator>william_choo</dc:creator>
    <dc:date>2021-06-02T06:39:23Z</dc:date>
    <item>
      <title>Searching for data from different log files with similar field names</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-data-from-different-log-files-with-similar-field/m-p/554013#M157275</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm new to Splunk here...&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a local instance of Splunk Enterprise on my local machine where I've created a data input via Data Input &amp;gt; Files &amp;amp; Directories, and then created an Index which I then map the data input to.&lt;/P&gt;&lt;P&gt;Within this folder, I've dumped various types of log files from different formats / types of web servers e.g. Apache webserver and IIS , even JSON-formatted log files for analysis.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I do search for a field name that exists in log files from different formats, does the search results come out for both? Is there any link/doc that explains the best practices or how Splunk behaves with regards to how data is indexed in this circumstance?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jun 2021 03:53:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-data-from-different-log-files-with-similar-field/m-p/554013#M157275</guid>
      <dc:creator>william_choo</dc:creator>
      <dc:date>2021-06-02T03:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for data from different log files with similar field names</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-data-from-different-log-files-with-similar-field/m-p/554024#M157276</link>
      <description>&lt;P&gt;Generally you would segregate your different log types into separate indexes and sourcetypes. The 'source' field will generally be the file (if it comes from a file) the data came from and sourcetype is based on your ingestion rules.&lt;/P&gt;&lt;P&gt;Yes, if you search&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=* field=x&lt;/LI-CODE&gt;&lt;P&gt;then it will find all data from the indexes where the events have a field called 'field' with the value x&lt;/P&gt;&lt;P&gt;I suggest you do the free Splunk Fundamentals 1 course and also read about getting data in&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.splunk.com/en_us/training/free-courses/splunk-fundamentals-1.html" target="_blank"&gt;https://www.splunk.com/en_us/training/free-courses/splunk-fundamentals-1.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.0/Data/Getstartedwithgettingdatain" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.0/Data/Getstartedwithgettingdatain&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jun 2021 04:56:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-data-from-different-log-files-with-similar-field/m-p/554024#M157276</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2021-06-02T04:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for data from different log files with similar field names</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Searching-for-data-from-different-log-files-with-similar-field/m-p/554049#M157285</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6367"&gt;@bowesmana&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the advice! Yes I've actually been doing quite a bit of 'unstructured' learning, hopping here and there and also viewing youtube tutorials... I guess I was speeding thru the search fundamentals and missed out some essentials. I was able to create my own Splunk app to ingest some logs but realized I didn't fully understand some of the basics which were crucial for analysis.&lt;/P&gt;&lt;P&gt;Thanks once again for the links!&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jun 2021 06:39:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Searching-for-data-from-different-log-files-with-similar-field/m-p/554049#M157285</guid>
      <dc:creator>william_choo</dc:creator>
      <dc:date>2021-06-02T06:39:23Z</dc:date>
    </item>
  </channel>
</rss>

