Getting Data In

Another Newbee Question...Searching Indexed Data

Rayj00
New Member

Totally new with Splunk. Have mercy on my soul! 🙂

I am trying to set up Splunk on my laptop as I am awaiting licensing issues to resolve for the Splunk Server we will be using.

I simply want to index and search my laptop (Window 7) event logs with Splunk, sort of a learning task for me. I am seeing about 25,000 event count in my_laptop index. On the search page I don't see any Fields listed. Actually nothing is listed. I did a "search=my_laptop" in the search field which I thought would list everything but I get nothing?

What am I missing?

Thanks,

Ray

Tags (1)
0 Karma

ftk
Motivator

By default the search app searches the main index only. Try the following search:

index=my_laptop

This will search for all events (implied *) in the my_laptop index.

Rayj00
New Member

Thanks for that tip.

0 Karma
Get Updates on the Splunk Community!

Combine Multiline Logs into a Single Event with SOCK - a Guide for Advanced Users

This article is the continuation of the “Combine multiline logs into a single event with SOCK - a step-by-step ...

Everything Community at .conf24!

You may have seen mention of the .conf Community Zone 'round these parts and found yourself wondering what ...

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...