<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk SPL Examples for WebSphere SystemOut Logs in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-SPL-Examples-for-WebSphere-SystemOut-Logs/m-p/695737#M236537</link>
    <description>&lt;P&gt;The problem I am having is the raw data looks like this:&amp;nbsp; "[8/8/24 13:37:46:622 EDT] 00007e14 HOSTEDWIRES** I ************"&lt;/P&gt;&lt;P&gt;What I am trying to do is do a search on the raw data find the "W" and "E"&lt;/P&gt;&lt;P&gt;The problem I am having is the raw data looks like this:&amp;nbsp; "[8/8/24 13:37:46:622 EDT] 00007e14 HOSTEDWIRES** W ************"&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;The problem I am having is the raw data looks like this:&amp;nbsp; "[8/8/24 13:37:46:622 EDT] 00007e14 HOSTEDWIRES** E ************"&lt;/P&gt;&lt;P&gt;A basic search I am using: (Sorry, I had to obfuscate some of the SPL.&lt;/P&gt;&lt;P&gt;index="index" host IN ("Server 1","Server 2","Backup Server 1","Backup Server 2") source=* sourcetype=###_was_systemout_log | ("W" or "E")&lt;/P&gt;&lt;P&gt;In WebSphere SystemOut logs, the warning or error indicator comes after the timestamp and application type.&amp;nbsp; So, when I search for just&amp;nbsp;("W" or "E") it will pull everything that has "W" "E" in the text.&amp;nbsp; How do I isolate it to search for that after the application type, and before the transaction raw data?&amp;nbsp; I don't get to play with Splunk that much, so this is beyond my skill level.&amp;nbsp; I am still learning.&amp;nbsp; Thanks again for the help.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Aug 2024 17:53:27 GMT</pubDate>
    <dc:creator>cadm777</dc:creator>
    <dc:date>2024-08-08T17:53:27Z</dc:date>
    <item>
      <title>Splunk SPL Examples for WebSphere SystemOut Logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-SPL-Examples-for-WebSphere-SystemOut-Logs/m-p/695725#M236533</link>
      <description>&lt;P&gt;&lt;SPAN&gt;We use Splunk, and I do know that our SystemOut logs are forwarded to the Splunk indexer. Does anyone have some example SPLs for searching indexes for WebSphere SystemOut Warnings "W" and SystemOut Errors "E"? Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For your reference, here is a link to IBM's WebSphere log interpretation:&amp;nbsp;&lt;A href="https://www.ibm.com/docs/en/was/8.5.5?topic=SSEQTP_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae/rtrb_readmsglogs.htm" target="_blank" rel="nofollow noopener noreferrer"&gt;ibm.com/docs/en/was/8.5.5?topic=SSEQTP_8.5.5/…&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2024 16:48:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-SPL-Examples-for-WebSphere-SystemOut-Logs/m-p/695725#M236533</guid>
      <dc:creator>cadm777</dc:creator>
      <dc:date>2024-08-08T16:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk SPL Examples for WebSphere SystemOut Logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-SPL-Examples-for-WebSphere-SystemOut-Logs/m-p/695732#M236535</link>
      <description>&lt;P&gt;The most important thing is to determine which index (not index*er*) holds the WebSphere logs.&amp;nbsp; That will narrow the scope of your search.&lt;/P&gt;&lt;P&gt;Once you have that information, you can begin your search.&amp;nbsp; Start with " W " and " E ".&amp;nbsp; Those aren't great strings for searching, but they're a start.&amp;nbsp; As you receive results, use what you find to add to the search string until have have what you want.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=websphere (" W " OR " E ")&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 08 Aug 2024 17:23:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-SPL-Examples-for-WebSphere-SystemOut-Logs/m-p/695732#M236535</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2024-08-08T17:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk SPL Examples for WebSphere SystemOut Logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-SPL-Examples-for-WebSphere-SystemOut-Logs/m-p/695737#M236537</link>
      <description>&lt;P&gt;The problem I am having is the raw data looks like this:&amp;nbsp; "[8/8/24 13:37:46:622 EDT] 00007e14 HOSTEDWIRES** I ************"&lt;/P&gt;&lt;P&gt;What I am trying to do is do a search on the raw data find the "W" and "E"&lt;/P&gt;&lt;P&gt;The problem I am having is the raw data looks like this:&amp;nbsp; "[8/8/24 13:37:46:622 EDT] 00007e14 HOSTEDWIRES** W ************"&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;The problem I am having is the raw data looks like this:&amp;nbsp; "[8/8/24 13:37:46:622 EDT] 00007e14 HOSTEDWIRES** E ************"&lt;/P&gt;&lt;P&gt;A basic search I am using: (Sorry, I had to obfuscate some of the SPL.&lt;/P&gt;&lt;P&gt;index="index" host IN ("Server 1","Server 2","Backup Server 1","Backup Server 2") source=* sourcetype=###_was_systemout_log | ("W" or "E")&lt;/P&gt;&lt;P&gt;In WebSphere SystemOut logs, the warning or error indicator comes after the timestamp and application type.&amp;nbsp; So, when I search for just&amp;nbsp;("W" or "E") it will pull everything that has "W" "E" in the text.&amp;nbsp; How do I isolate it to search for that after the application type, and before the transaction raw data?&amp;nbsp; I don't get to play with Splunk that much, so this is beyond my skill level.&amp;nbsp; I am still learning.&amp;nbsp; Thanks again for the help.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2024 17:53:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-SPL-Examples-for-WebSphere-SystemOut-Logs/m-p/695737#M236537</guid>
      <dc:creator>cadm777</dc:creator>
      <dc:date>2024-08-08T17:53:27Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk SPL Examples for WebSphere SystemOut Logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-SPL-Examples-for-WebSphere-SystemOut-Logs/m-p/695748#M236538</link>
      <description>&lt;P&gt;Searching for "W" or "E" will return a lot of noise.&amp;nbsp; That's why my suggested query included spaces around each letter - the goal being to find the isolated severity codes.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2024 19:06:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-SPL-Examples-for-WebSphere-SystemOut-Logs/m-p/695748#M236538</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2024-08-08T19:06:12Z</dc:date>
    </item>
  </channel>
</rss>

