Splunk Search

How do I find the "Event" that directly proceeds the selected "Event"?

philrego
Path Finder

Let's say I perform this search:

index=mysecretindex host=mysecrethost*  source="/my.log" error-3005

Then say I select an "event".
How do I find the "event" that directly precedes (ordered by time) the selected "event"?

0 Karma
1 Solution

philrego
Path Finder

You can't. If you want to see the event that directly precedes the event you will need to remove all your filters and manually look through the rows one by one. It can take hours but it's the only way if you want to use Splunk.

View solution in original post

0 Karma

philrego
Path Finder

You can't. If you want to see the event that directly precedes the event you will need to remove all your filters and manually look through the rows one by one. It can take hours but it's the only way if you want to use Splunk.

0 Karma

nabeel652
Builder

From what I have understood, this example may help you with some modifications:

index=_internal sourcetype=splunkd_access | streamstats count | table _raw count | eval selected_event = 5 | where count>=selected_event | head 2
0 Karma

philrego
Path Finder

I'm not going to enter that huge line just when I want to see the preceding event. That doesn't even do anything close to what I've asked. Please delete.

0 Karma

nabeel652
Builder

What do you mean by select? How are you selecting the event?

0 Karma

philrego
Path Finder

Click on. By clicking

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...

Logs to Metrics

Logs and Metrics Logs are generally unstructured text or structured events emitted by applications and written ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...