Getting Data In

Making splunk act like tail -f $file



I'm trying to get Splunk to do the equivalent of a tail -f $file. Specifically what I'm trying to do is get the event output lines to be a lot more compressed and just show the raw text, no parsing, no field picker, no arrows, no splunk time stamps. I don't know how much of this is possible, but some of it might be.


Tags (3)

Splunk Employee
Splunk Employee
  1. Create a search that shows the events you're interested in, e.g., maybe it's just source=/var/log/file.log, or source=*whatever.log | head 500. The search should have a real-time time range.

  2. From the actions menu, select "Add to dashboard". Add the search to a new dashboard.

  3. Edit the dashboard's View XML, using the event panel as a reference. You won't be able to remove the timestamp or change the spacing or typeface from here. Some things will require an edit of the CSS behind this view.

  4. If you prefer, use @Mackenzie's technique of picking out the _raw field and display the results with the <table> panel rather than the <event> panel. You can edit the prefs of this in the view XML as well.


A simple solution that may achieve what you want is:

| fields _raw | eval event=_raw | table event

Get Updates on the Splunk Community!

Index This | A sphere has three, a circle has two, and a point has zero. What is it?

September 2023 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

Build Scalable Security While Moving to Cloud - Guide From Clayton Homes

 Clayton Homes faced the increased challenge of strengthening their security posture as they went through ...

Mission Control | Explore the latest release of Splunk Mission Control (2.3)

We’re happy to announce the release of Mission Control 2.3 which includes several new and exciting features ...