Splunk Search

Splunk Search
Community Activity
burwell
We have Splunk 6.4 and are using Hunk + Hive. Our jobs produce 100,000+ files in dispatch. What is the expected beha...
by SplunkTrust SplunkTrust in Splunk Search 05-03-2016
0 3
0
3
thisissplunk
I've made an external lookup python script that calculates the entropy of a field's value using the first block of co...
by thisissplunk Builder in Splunk Search 05-03-2016
0 1
0
1
willamwar
I want to get a list of all hosts not sending "WinEventLog:Security". So index=wineventlog, get list of hosts, remove...
by willamwar Path Finder in Splunk Search 05-03-2016
0 1
0
1
thisissplunk
All of the examples I've seen are too advanced or don't describe the code line by line. Can someone take the time to...
by thisissplunk Builder in Splunk Search 05-03-2016
3 5
3
5
guillecasco
Pretty new with Splunk, simple question. I have: index=* asset id: "*" I just want a table that counts every d...
by guillecasco Path Finder in Splunk Search 05-03-2016
0 3
0
3
chanukhya
I am trying to get average response times of all services (services1.. service n). I am able to get average response ...
by chanukhya Explorer in Splunk Search 05-03-2016
0 3
0
3
garinapavan
Hi, I want to add colors for my search result based on the duration . Any help is appreicated Here is my search ...
by garinapavan Explorer in Splunk Search 05-03-2016
0 1
0
1
Estrellia
Hello all, I am struggling while trying to write a regex to capture the second and third occurrence of a pattern. ...
by Estrellia Explorer in Splunk Search 05-03-2016
0 2
0
2
RunNateRun
I am attempting to create a search to alert on when a previously disabled employee is re-enabled. Currently, my searc...
by RunNateRun New Member in Splunk Search 05-03-2016
0 3
0
3
benmon
Hi, I need to filter the results that are present in the lookup tables. This search is what I have used: index=* so...
by benmon Explorer in Splunk Search 05-03-2016
0 1
0
1
smudge797
Splunk is not recognizing the fields. What is the recommended method to extract these fields, especially username wh...
by smudge797 Path Finder in Splunk Search 05-03-2016
0 13
0
13
fliao
I'm running into a problem where some events are parsed in the middle versus from the beginning of the string. For th...
by fliao New Member in Splunk Search 05-02-2016
0 2
0
2
priyanka_yadav
How to assign inner search returned value from source1 to outer search field from source2? Inner search: index=apic...
by priyanka_yadav New Member in Splunk Search 05-02-2016
0 4
0
4
monteirolopes
Hi, I created a search that returns me a table with some values, follows: ... | table name, id, date I scheduled ...
by monteirolopes Communicator in Splunk Search 05-02-2016
0 3
0
3
renems
I have a list of servers, osname & version and a lookup with products, versions and end-of-support dates. Each produc...
by renems Communicator in Splunk Search 05-02-2016
1 4
1
4
emamedov
I am trying to find the last 5 events of a type x that happened before an event of type y. An example would be: Even...
by emamedov Explorer in Splunk Search 05-02-2016
0 2
0
2
lyndac
I have a requirement to mask the value of a field after 30 days. The events are json events. The users need to be a...
by lyndac Contributor in Splunk Search 05-02-2016
0 7
0
7
smhsplunk
I have 9 drop-downs, and depending on user selection, the search is going to use those values to create a table. Sinc...
by smhsplunk Communicator in Splunk Search 05-02-2016
0 2
0
2
rewritex
Background: My data is being sent to a summary index. The search that populates the summary index is: index=test1 tr...
by rewritex Contributor in Splunk Search 05-02-2016
0 4
0
4
mattnovak
I'm attempting to use some KV pairs as tokens (i.e., $result.configuration$ and $result.version$) in an email alert. ...
by mattnovak Explorer in Splunk Search 05-02-2016
0 4
0
4
fmerrow
So on the GUI I have been looking at the various time pickers . . . specifically "Date & Time" and "Advanced". I see...
by fmerrow New Member in Splunk Search 05-02-2016
0 2
0
2
malderhout
If have the following search in Splunk: sourcetype = Tweets | stats count(eval(match(text, "string1"))) AS "string1"...
by malderhout New Member in Splunk Search 05-02-2016
0 4
0
4
lordadmiral
Hi there, I have events which indicate opening and closing of an event. I want to see the amount of open events (th...
by lordadmiral New Member in Splunk Search 05-02-2016
0 4
0
4
hcannon
I feel like this should be easily done with eval, but it doesn't seem to be working for me! I have data sets that in...
by hcannon Path Finder in Splunk Search 04-30-2016
0 3
0
3
Lucas_K
Is there a method that I can provide the app context to a cli export search? I have a savedsearch called "GetLogins"...
by Lucas_K Motivator in Splunk Search 04-30-2016
0 1
0
1
Get Updates on the Splunk Community!

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...