Let's say I perform this search:
index=mysecretindex host=mysecrethost* source="/my.log" error-3005
Then say I select an "event".
How do I find the "event" that directly precedes (ordered by time) the selected "event"?
You can't. If you want to see the event that directly precedes the event you will need to remove all your filters and manually look through the rows one by one. It can take hours but it's the only way if you want to use Splunk.
You can't. If you want to see the event that directly precedes the event you will need to remove all your filters and manually look through the rows one by one. It can take hours but it's the only way if you want to use Splunk.
From what I have understood, this example may help you with some modifications:
index=_internal sourcetype=splunkd_access | streamstats count | table _raw count | eval selected_event = 5 | where count>=selected_event | head 2
I'm not going to enter that huge line just when I want to see the preceding event. That doesn't even do anything close to what I've asked. Please delete.
What do you mean by select? How are you selecting the event?
Click on. By clicking