Splunk Search

How do I find the "Event" that directly proceeds the selected "Event"?

Path Finder

Let's say I perform this search:

index=mysecretindex host=mysecrethost*  source="/my.log" error-3005

Then say I select an "event".
How do I find the "event" that directly precedes (ordered by time) the selected "event"?

0 Karma
1 Solution

Path Finder

You can't. If you want to see the event that directly precedes the event you will need to remove all your filters and manually look through the rows one by one. It can take hours but it's the only way if you want to use Splunk.

View solution in original post

0 Karma

Path Finder

You can't. If you want to see the event that directly precedes the event you will need to remove all your filters and manually look through the rows one by one. It can take hours but it's the only way if you want to use Splunk.

View solution in original post

0 Karma

Builder

From what I have understood, this example may help you with some modifications:

index=_internal sourcetype=splunkd_access | streamstats count | table _raw count | eval selected_event = 5 | where count>=selected_event | head 2
0 Karma

Path Finder

I'm not going to enter that huge line just when I want to see the preceding event. That doesn't even do anything close to what I've asked. Please delete.

0 Karma

Builder

What do you mean by select? How are you selecting the event?

0 Karma

Path Finder

Click on. By clicking

0 Karma