Splunk Search

How to configure the number of event rows in the Event Log Collection list.

denisdabtist
New Member

I have some problems with configuring rows in the event log collection list. For now, we use default Splunk data for display log lists, but I need to configure more rows than 7.

[timeStamp=2020-03-24 14:43:42.612 +0000] [thread=ForkJoinPool-1-worker-115] [logLevel=INFO] [eventType=xxxxxxxxxxxxBetxxxxxmentxxxxxxder] - className=UpstreamLoggingHelper, methodName=loggingUpstreamError, message= requestId="xxxxxxxxxxxxxxxx" sessionToken="xxxxxxxxxxxxxxxx" userId="xxxxx" ref="xxxxxxxxxxxxx xxxxxxxxxxx" event="xxxxxxxxxxxxxx" eventDirection="Response" latency="256" httpCode="422"
UPSTREAM ERROR=
{
1. "statusCode": "PurchaseNotAccepted",
2."statusDescription": "PurchaseNotAccepted",
3."response": {
4."id": "",
5."status": "Declined",
6."creationDate": "2020-03-24T14:43:42.1297069Z",
7."bets": [
Show all 61 lines

Who knows where I can do these changes.

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...