Splunk Search

How do I search for a single specific event?

Contributor

Sometimes I come across an event in my index that I'd like to refer to later, either as part of an investigation or to send to a colleague. Is there an event ID that I can search for that will always return that specific event? The closest I've gotten is to search on the timestamp of the event and hope that there aren't too many other events with the same timestamp.

Tags (2)
1 Solution

Splunk Employee
Splunk Employee

Splunk currently does not provide a unique event id but will in a future release. This Q&A talks about it in greater detail

View solution in original post

Splunk Employee
Splunk Employee

Splunk currently does not provide a unique event id but will in a future release. This Q&A talks about it in greater detail

View solution in original post

Contributor

After your search job finished, you will find a link in the dropdown menu «Actions» on top the search form called «Get links to results». This will generate a unique HTTP url which you can distribute to your colleagues. He simply has to authenticate and gets the same search results immediately. To get only a limited number of events, use the search command «head», for example: sourcetype="access_combined" | head 10 will return the first 10 search results.

Contributor

Yes, static jobs can be saved and referenced, but I was specifically asking about being able to search, on an ad-hoc basis, for a single event independently from a pre-existing job. For example, I should be able to use an event id as part of a new search without referencing a previous search.

0 Karma
State of Splunk Careers

Access the Splunk Careers Report to see real data that shows how Splunk mastery increases your value and job satisfaction.

Find out what your skills are worth!