Splunk Search

Howto display search result matching a keyword and few line before and after the keyword matched

Path Finder


I've this specific requirement for log search when matching a keyword, the result show display the matched event and 5 lines before and after the matched event.

The search is simple as below:

index="booking" host=* "CreateBookingError"| table _raw

The objective is to know the chronological of events matching this keyword. How can I achieve it?


0 Karma

0 Karma
Get Updates on the Splunk Community!

Last Chance to Submit Your Paper For BSides Splunk - Deadline is August 12th!

Hello everyone! Don't wait to submit - The deadline is August 12th! We have truly missed the community so ...

Ready, Set, SOAR: How Utility Apps Can Up Level Your Playbooks!

 WATCH NOW Powering your capabilities has never been so easy with ready-made Splunk® SOAR Utility Apps. Parse ...

DevSecOps: Why You Should Care and How To Get Started

 WATCH NOW In this Tech Talk we will talk about what people mean by DevSecOps and deep dive into the different ...