Splunk Search

Howto display search result matching a keyword and few line before and after the keyword matched

Path Finder


I've this specific requirement for log search when matching a keyword, the result show display the matched event and 5 lines before and after the matched event.

The search is simple as below:

index="booking" host=* "CreateBookingError"| table _raw

The objective is to know the chronological of events matching this keyword. How can I achieve it?


0 Karma

0 Karma
Get Updates on the Splunk Community!

.conf23 | Get Your Cybersecurity Defense Analyst Certification in Vegas

We’re excited to announce a new Splunk certification exam being released at .conf23! If you’re going to Las ...

Streamline Data Ingestion With Deployment Server Essentials

REGISTER NOW!Every day the list of sources Admins are responsible for gets bigger and bigger, often making the ...

Remediate Threats Faster and Simplify Investigations With Splunk Enterprise Security ...

REGISTER NOW!Join us for a Tech Talk around our latest release of Splunk Enterprise Security 7.2! We’ll walk ...