Splunk Search

Splunk Search
Community Activity
singhh4
Hey guys, So I've used strptime before but for some reason this isn't working properly. I have a column with differe...
by singhh4 Path Finder in Splunk Search 09-23-2016
0 6
0
6
jward6004
I'm building reporting for capacity planning to improve the performance across our splunk environment. During my com...
by jward6004 Explorer in Splunk Search 09-23-2016
0 2
0
2
adoshi
I would like to know how to subtract 30 minutes from the call to the now() function and set the value of a field call...
by adoshi Explorer in Splunk Search 09-23-2016
2 7
2
7
trevorQmulos
I am looking for the most efficient way to do a sub search to see if vulnerabilities still exist now vs 90 days. Cu...
by trevorQmulos New Member in Splunk Search 09-23-2016
0 14
0
14
Navanitha
I am trying to extract the field starting with C ending with I from following strings. Can anyone pls suggest the ap...
by Navanitha Path Finder in Splunk Search 09-23-2016
0 6
0
6
Justin1224
Hey everyone, I'm confused about what the second command in my search does. Here is the whole search: | useraccount...
by Justin1224 Communicator in Splunk Search 09-23-2016
0 2
0
2
snehalk
Hello All, I need to find from particular source how many we have duplicate files in last 7 days. I have used thi...
by snehalk Communicator in Splunk Search 09-23-2016
1 9
1
9
email2vamsi
Stats count returns nine events for Points-1 & 2. But as shown in the point-3 below, the actual events count is three...
by email2vamsi Explorer in Splunk Search 09-23-2016
1 8
1
8
rolfiee
Hi All, I have the following search result, but how to split it in a nice view e.g. like row names and values. Sep ...
by rolfiee New Member in Splunk Search 09-23-2016
0 1
0
1
priyankamundarg
My source filed has value such as, /Folder1/Folder2/Folder3/Folder4/Folder5/LoadABCDEF_20160921.log I would like t...
by priyankamundarg Explorer in Splunk Search 09-23-2016
0 16
0
16
jdanij
Hello, I've got some events like this extracting fields using kv_mode=auto: key1="value1", key2="value2", null1="NU...
by jdanij Path Finder in Splunk Search 09-23-2016
0 6
0
6
hsh
I’m trying to create a panel that will display the numerical number for a field called method_duration. For each even...
by hsh New Member in Splunk Search 09-22-2016
0 1
0
1
mfietz
We have log entries with multiple key-value pairs. All of the keys I'm interested in have a common prefix and all of ...
by mfietz New Member in Splunk Search 09-22-2016
0 3
0
3
torustad
Hi all, We have the following setup: Splunk Enterprise Server 6.4.1 Windows2008R2, 16 GB Physical Memory, 4 CPU Cor...
by torustad Path Finder in Splunk Search 09-22-2016
2 6
2
6
kuja
Splunk Web search ran: sourcetype=vmstat |head 10| table _time source sourcetype mem_free OUTPUT is as listed abov...
by kuja Splunk Employee Splunk Employee in Splunk Search 09-22-2016
1 3
1
3
gowthamkb
I want to correlate data from 2 sources. First data source contains store_events (source1=store_events) and second so...
by gowthamkb Explorer in Splunk Search 09-22-2016
1 6
1
6
jambraun
I know this type of question has been asked many times before, but I haven't been able to get results from using REX....
by jambraun Explorer in Splunk Search 09-22-2016
0 4
0
4
changux
Hi all. I have almost 20 different sourcetypes. Field names in sourcetypes are different and I don't have the same i...
by changux Builder in Splunk Search 09-22-2016
1 3
1
3
andynieto
Hello community, So I'm looking for some help here on how to build a search that will add up the total number of tra...
by andynieto Engager in Splunk Search 09-22-2016
1 1
1
1
prathikpisplunk
SQL JOIN clause gets intersection of two tables. In Splunk search, if I use OR on two different sources, I am not g...
by prathikpisplunk Explorer in Splunk Search 09-22-2016
0 6
0
6
phil_dupree
I have been tasked with building a dashboard which shows the total number of transactions today for each server. I c...
by phil_dupree New Member in Splunk Search 09-22-2016
0 3
0
3
christopheryu
I have two sourcetypes, TICKET_OPENED & TICKET_ACTIVITY, both of which have a common field TICKET_NUMBER. I am able t...
by christopheryu Communicator in Splunk Search 09-22-2016
0 12
0
12
dbcase
Hi, I have this query index=os sourcetype=vmstat OR sourcetype=cpu OR sourcetype=df host=betamax-admin Filesyst...
by dbcase Motivator in Splunk Search 09-22-2016
1 2
1
2
srikanth1213
Can someone help me with a Splunk search string to find list of indexers, their source and sourcetype?
by srikanth1213 Path Finder in Splunk Search 09-22-2016
0 3
0
3
AverageMale
This is my sample logs in [bowlers]: "doYouBowl":"YES", "pin":"123", "name":"Billy" "doYouBowl":"NO", "pin":"456", ...
by AverageMale Engager in Splunk Search 09-22-2016
0 7
0
7
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...
Top Solution Authors