Splunk Search

Can someone explain the parameters of <search>?

NickGrava
Engager

Hi Team!

Someone please explain to me what each parameter is responsible for in such a search tag:

<search>
<query>system="SWAP_total" host = crm.narsdade.com
| bin _time span=1d
| dedup _time
| eval requestLasts = requestLimit - requestCount
| table requestCount, requestLasts
| rename requestCount AS "Requests done", requestLasts AS "Requests to go"
| transpose
| eval foobar_slice = column + " (" + 'row 1'+")"
| fields foobar_slice, "row 1"</query>
<earliest>-24h@h</earliest>
<latest>now</latest>
<sampleRatio>1</sampleRatio>
</search>

 

what is system..host.. and other attributes means for..

Labels (2)
0 Karma
1 Solution

yuanliu
SplunkTrust
SplunkTrust

With the exception of requestLasts and foobar_slice which the programmer defined in the code, the rest are all from your raw data.  _time and host are essential fields that all Splunk data must have; _time is obvious, host usually reflects the source from which the event is reported from or for.  The rest of fields can only be explained by someone with intimate knowledge about the application that produces these events.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

You can find all of the elements in the Dashboards and Visualizations manual (https://docs.splunk.com/Documentation/Splunk/9.0.1/Viz/PanelreferenceforSimplifiedXML#search).

The <query> element is the search for Splunk to perform.  To learn about what goes here, try the Search Tutorial manual (https://docs.splunk.com/Documentation/Splunk/9.0.1/SearchTutorial/WelcometotheSearchTutorial) or the free training available at https://www.splunk.com/en_us/training/course-catalog.html?sort=Newest&filters=filterGroup1FreeCourse...

---
If this reply helps you, Karma would be appreciated.

yuanliu
SplunkTrust
SplunkTrust

With the exception of requestLasts and foobar_slice which the programmer defined in the code, the rest are all from your raw data.  _time and host are essential fields that all Splunk data must have; _time is obvious, host usually reflects the source from which the event is reported from or for.  The rest of fields can only be explained by someone with intimate knowledge about the application that produces these events.

Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...