Splunk Search

How to configure the number of event rows in the Event Log Collection list.

denisdabtist
New Member

I have some problems with configuring rows in the event log collection list. For now, we use default Splunk data for display log lists, but I need to configure more rows than 7.

[timeStamp=2020-03-24 14:43:42.612 +0000] [thread=ForkJoinPool-1-worker-115] [logLevel=INFO] [eventType=xxxxxxxxxxxxBetxxxxxmentxxxxxxder] - className=UpstreamLoggingHelper, methodName=loggingUpstreamError, message= requestId="xxxxxxxxxxxxxxxx" sessionToken="xxxxxxxxxxxxxxxx" userId="xxxxx" ref="xxxxxxxxxxxxx xxxxxxxxxxx" event="xxxxxxxxxxxxxx" eventDirection="Response" latency="256" httpCode="422"
UPSTREAM ERROR=
{
1. "statusCode": "PurchaseNotAccepted",
2."statusDescription": "PurchaseNotAccepted",
3."response": {
4."id": "",
5."status": "Declined",
6."creationDate": "2020-03-24T14:43:42.1297069Z",
7."bets": [
Show all 61 lines

Who knows where I can do these changes.

0 Karma
Get Updates on the Splunk Community!

Take Your Breath Away with Splunk Risk-Based Alerting (RBA)

WATCH NOW!The Splunk Guide to Risk-Based Alerting is here to empower your SOC like never before. Join Haylee ...

SignalFlow: What? Why? How?

What is SignalFlow? Splunk Observability Cloud’s analytics engine, SignalFlow, opens up a world of in-depth ...

Federated Search for Amazon S3 | Key Use Cases to Streamline Compliance Workflows

Modern business operations are supported by data compliance. As regulations evolve, organizations must ...