Splunk Search

How to configure the number of event rows in the Event Log Collection list.

denisdabtist
New Member

I have some problems with configuring rows in the event log collection list. For now, we use default Splunk data for display log lists, but I need to configure more rows than 7.

[timeStamp=2020-03-24 14:43:42.612 +0000] [thread=ForkJoinPool-1-worker-115] [logLevel=INFO] [eventType=xxxxxxxxxxxxBetxxxxxmentxxxxxxder] - className=UpstreamLoggingHelper, methodName=loggingUpstreamError, message= requestId="xxxxxxxxxxxxxxxx" sessionToken="xxxxxxxxxxxxxxxx" userId="xxxxx" ref="xxxxxxxxxxxxx xxxxxxxxxxx" event="xxxxxxxxxxxxxx" eventDirection="Response" latency="256" httpCode="422"
UPSTREAM ERROR=
{
1. "statusCode": "PurchaseNotAccepted",
2."statusDescription": "PurchaseNotAccepted",
3."response": {
4."id": "",
5."status": "Declined",
6."creationDate": "2020-03-24T14:43:42.1297069Z",
7."bets": [
Show all 61 lines

Who knows where I can do these changes.

0 Karma
Get Updates on the Splunk Community!

Demo Day: Strengthen Your SOC with Splunk Enterprise Security 8.1

Today’s threat landscape is more complex than ever. Security operation centers (SOCs) are overwhelmed with ...

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...