Splunk Search

Splunk Search
Community Activity
alan20854
Hi, I am using a lookup table to populate 3 dropdown menus: Source, Service, and Method, where each selection of the...
by alan20854 Path Finder in Splunk Search 06-23-2016
0 5
0
5
spunkyg
I can pull the Apache access_log into Splunk, but I can't figure out now to write a search that will give the total n...
by spunkyg Engager in Splunk Search 06-23-2016
0 4
0
4
guruwells
Hi All, On a daily basis, I am running one search to get results in a table representation format. I wanted to see t...
by guruwells Explorer in Splunk Search 06-23-2016
0 2
0
2
bowesmana
I have data like: id,type,id2 1,a,100 2,a,100 3,c, 4,a,101 5,a,101 6,b,102 7,b,102 8,b,102 9,b,103 10,b,103 11,b,103...
by SplunkTrust SplunkTrust in Splunk Search 06-23-2016
0 11
0
11
SanthoshSreshta
Hi All. I want to calculate the percentage of churned_customer in rural and urban areas. The columns i have are CHUR...
by SanthoshSreshta Contributor in Splunk Search 06-22-2016
0 6
0
6
ppatkar
I have three statements in my log file for each transaction like below: index=abc* source="abc.log" 2410286283_b310...
by ppatkar Path Finder in Splunk Search 06-22-2016
0 2
0
2
yacht_rock
I have multiple alerts, each at different severity levels. The output of these alerts are fields like source, destina...
by yacht_rock Explorer in Splunk Search 06-22-2016
0 4
0
4
tankhanandita
The Splunk documentation says that we use pipe character when we need to club two or more commands, but in some cases...
by tankhanandita Explorer in Splunk Search 06-22-2016
0 4
0
4
clarksinthehill
I have a set of data that I would like to exclude the second search result set from. First search: Gets me all the e...
by clarksinthehill Explorer in Splunk Search 06-22-2016
0 2
0
2
splunker1981
Hello all, Trying to figure out how to search or filter based on the matches in my case statement. I guess also wan...
by splunker1981 Path Finder in Splunk Search 06-22-2016
0 7
0
7
bspier1
In one event, I see that a search results with this following line: "SERIES". That line tells me that the user select...
by bspier1 New Member in Splunk Search 06-22-2016
0 4
0
4
splunkrocks2014
Hi. How do I filter my results from an extracted field and where-clause? I have a user lookup table which contain...
by splunkrocks2014 Communicator in Splunk Search 06-22-2016
0 6
0
6
JSkier
I'd like to sanitize host names during search time in Splunk (IDS alerts), so users don't receive a hyperlink to the ...
by JSkier Communicator in Splunk Search 06-22-2016
0 4
0
4
alan20854
Hi, I am creating a dashboard with 2 drop-downs, one for Services and the other for Methods, and I want the search ...
by alan20854 Path Finder in Splunk Search 06-22-2016
0 4
0
4
KSKandala
Hi, Currently I am consolidating data from different indexes. index=application1 ID=$id$ | rename application1_id ...
by KSKandala New Member in Splunk Search 06-22-2016
0 1
0
1
chvnc
I want to make a new field with extracted values like Header.txt, LogMessage.xml , JSON_HEADER.json (it's from the se...
by chvnc Explorer in Splunk Search 06-22-2016
0 1
0
1
voninski
Not sure how to accomplish this and need some advice from the experts here. I am working with data from a torque too...
by voninski New Member in Splunk Search 06-22-2016
0 4
0
4
DF10569
Search I am trying to use: index="wineventlog" (EventCode=4656 Accesses=DELETE) OR EventCode=1102 OR EventCode=4670...
by DF10569 New Member in Splunk Search 06-22-2016
0 2
0
2
kiran331
Hi How can I extract the "TCP_MISS/200" and "TCP_MISS_SSL/200" or similar from the event below? 1466609862.644 109...
by kiran331 Builder in Splunk Search 06-22-2016
0 1
0
1
zeophlite
I have a field in my events that is a string (but does not translate to a number directly) Is there a way to convert...
by zeophlite New Member in Splunk Search 06-22-2016
0 4
0
4
szabados
I created a datamodel from a source, which had spaces in the field names, but field were automatically created with t...
by szabados Communicator in Splunk Search 06-22-2016
3 2
3
2
daniel_augustyn
I am not sure how to fix the date extraction from a raw log which is done by default by Splunk. Splunk extracts date ...
by daniel_augustyn Contributor in Splunk Search 06-21-2016
0 4
0
4
sanchitguptaiit
I have a requirement where I need to search all logs to match a set of patterns and extract some values. Is there som...
by sanchitguptaiit Explorer in Splunk Search 06-21-2016
0 1
0
1
goodsellt
My problem stems from how the last value functions, where it pulls the last value from the previous event. While I wa...
by goodsellt Contributor in Splunk Search 06-21-2016
0 1
0
1
haziqwebs
I want to rename CPU001 to CPU1, CPU_ALL to CPUALL, is it possible?
by haziqwebs New Member in Splunk Search 06-21-2016
0 3
0
3
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...

Design, Compete, Win: Submit Your Best Splunk Dashboards for a .conf26 Pass

Hello Splunkers,  We’re excited to kick off a Splunk Dashboard contest! We know that dashboards are a primary ...

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...