Splunk Search

How do I find the "Event" that directly proceeds the selected "Event"?

philrego
Path Finder

Let's say I perform this search:

index=mysecretindex host=mysecrethost*  source="/my.log" error-3005

Then say I select an "event".
How do I find the "event" that directly precedes (ordered by time) the selected "event"?

0 Karma
1 Solution

philrego
Path Finder

You can't. If you want to see the event that directly precedes the event you will need to remove all your filters and manually look through the rows one by one. It can take hours but it's the only way if you want to use Splunk.

View solution in original post

0 Karma

philrego
Path Finder

You can't. If you want to see the event that directly precedes the event you will need to remove all your filters and manually look through the rows one by one. It can take hours but it's the only way if you want to use Splunk.

0 Karma

nabeel652
Builder

From what I have understood, this example may help you with some modifications:

index=_internal sourcetype=splunkd_access | streamstats count | table _raw count | eval selected_event = 5 | where count>=selected_event | head 2
0 Karma

philrego
Path Finder

I'm not going to enter that huge line just when I want to see the preceding event. That doesn't even do anything close to what I've asked. Please delete.

0 Karma

nabeel652
Builder

What do you mean by select? How are you selecting the event?

0 Karma

philrego
Path Finder

Click on. By clicking

0 Karma
Get Updates on the Splunk Community!

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...

State of Splunk Careers 2024: Maximizing Career Outcomes and the Continued Value of ...

For the past four years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...

Data-Driven Success: Splunk & Financial Services

Splunk streamlines the process of extracting insights from large volumes of data. In this fast-paced world, ...