I am trying to upload logs and whenever I do the logs come out scattered.
Do I have to give every colum a title e.g In the column where there are src_ip's do I have to indicate that as the header of that column? Because in the raw logs there isn't anything of such just values.
Anytime I try doing a query for example index=** sourcetype=*** | top limit=10 user src_ip
It doesn't give me any result.
The only time I get a result is just with the index=** sourcetype=***
In the second photo attached, the INTERESTING FIELD has the values instead of the name.
Hi @UncleHugo ,
the issue isn't in the search that you're using but in the log ingestion.
How did you ingest these logs?
Where did they come from: a csv or whatelse?
Using the corect way to ingest logs you have the correct fields to use in the searches.
At the same time, the reason because you don't have results using user and src_ip fields in the top command is probably that you don't have in your events one (or both) of the fields that you're using in the top command: user or src_ip; do you see them in interesting fields?
In addition, to help us to help you:
My hint is to follow some training in Getting data in: you can run a search on Google and find training documentation and videos, starting from the Search Tutorial: https://docs.splunk.com/Documentation/SplunkCloud/latest/SearchTutorial/WelcometotheSearchTutorial
Ciao.
Giuseppe
Thanks @gcusello