Splunk Search

Select multiple lines into a new filed

3amer92
Explorer

Hello!

So I'm new to Splunk, and I have a very long event but I'm only interested in the below two lines (there are a lot of lines above and below these two lines):

 

05:54:24.100 [33140] [BAF3E974-33AA-4651-FF04-12355EF15677] POST  <<  https://xx.xx.xx/xx/xxx/xxxx/xxx/
---------- MAX REQUEST TIME WARNING (100000 ms)

 

 Is there any way to get only these two line into a new field?

Labels (3)
0 Karma
Get Updates on the Splunk Community!

Simplifying the Analyst Experience with Finding-based Detections

    Splunk invites you to an engaging Tech Talk focused on streamlining security operations with ...

[Puzzles] Solve, Learn, Repeat: Word Search

This challenge was first posted on Slack #puzzles channelThis puzzle is based on a letter grid containing ...

[Puzzles] Solve, Learn, Repeat: Advent of Code - Day 4

Advent of CodeIn order to participate in these challenges, you will need to register with the Advent of Code ...