Splunk Search

Splunk Search
Community Activity
lemikg
Hi Splunkers, I am trying to extract the hosts via regex. host="*" | regex host="([a-zA-Z0-9]([a-zA-Z0-9\-]{0,61}[a...
by lemikg Communicator in Splunk Search 02-25-2013
1 4
1
4
renuka13
using CDR data,I want to display no of call drops occuring in each base station in the form of bubbles or (any visual...
by renuka13 Explorer in Splunk Search 02-25-2013
0 1
0
1
bsayatovic
I have several enterprise applications which are split up into multiple services and tiers, all of which are being Sp...
by bsayatovic Path Finder in Splunk Search 02-25-2013
0 4
0
4
barne_dn
Hey Everyone, I don't know if I'm doing this correctly. I have a text file that contains data I want to index. So w...
by barne_dn Explorer in Splunk Search 02-25-2013
0 9
0
9
davidc
What's the best way to organize "Searches and Reports" and "Views"? I'm trying to figure out some type of structure ...
by davidc Engager in Splunk Search 02-25-2013
2 3
2
3
nageshreddy81
I am trying to create a custom field using Field-Extraction and Field-Transformation pages of Manager. I am providing...
by nageshreddy81 New Member in Splunk Search 02-25-2013
0 3
0
3
khyoung7410
I'm bringing data from a database every 1 minuite. Data is three kinds. Data type is 1. 2013-02-01 13:12:01;i;OS000...
by khyoung7410 Communicator in Splunk Search 02-25-2013
0 1
0
1
rdownie
If I use: |dbquery mydb "select userid from mydb.people where username = 'jsmith' | rename userid as UID | lookup myd...
by rdownie Communicator in Splunk Search 02-24-2013
0 5
0
5
lemikg
Hi, I don't know if this is the right way to do it, but I have a list of COMMANDS which I have associated a Classifi...
by lemikg Communicator in Splunk Search 02-24-2013
1 3
1
3
kenchisho
Hi guys, I have been playing around trying to match multiple ocurances of a pattern and replace it with a regex in t...
by kenchisho Path Finder in Splunk Search 02-22-2013
0 2
0
2
tnkoehn
Let's say I have log records that look like this Field 1 Field 2 ABC XYZ ABC KLM XYZ ABC...
by tnkoehn Path Finder in Splunk Search 02-22-2013
0 1
0
1
aferone
We run a report every week that counts how many times a firewall policy was used. (A firewall policy is represented ...
by aferone Builder in Splunk Search 02-22-2013
0 5
0
5
dannux
Hi Everyone, I am doing the following search sourcetype="a" OR sourcetype="b" OR sourcetype="c" CPU_IDLE<40 | tim...
by dannux Path Finder in Splunk Search 02-22-2013
0 2
0
2
cphair
Hello, I'm wondering if there's a way to trim characters from an unknown field value during search. I'm tracking pe...
by cphair Builder in Splunk Search 02-22-2013
4 4
4
4
kingsizebk
I cannot seem to "eval" a field obtained from a "rex" and i am pretty sure the field is only digits... this is simili...
by kingsizebk Path Finder in Splunk Search 02-22-2013
0 3
0
3
aapittts
I have raw data that looks like this: (4)example(3)domain(3)com(0). In my search, I've been using a macro that looks ...
by aapittts Path Finder in Splunk Search 02-22-2013
0 1
0
1
lemikg
Hi Splunkers I have two searches I want to compare, but unfortunately can't find my way around it. First is: CPU lo...
by lemikg Communicator in Splunk Search 02-22-2013
0 2
0
2
hartfoml
I am in a clustered indexer environment and some but not all of my indexers are showing this error "The lookup table...
by hartfoml Motivator in Splunk Search 02-22-2013
0 4
0
4
whateverman
So I’m trying to link a couple different fields together to get the data I’m looking for, but it involves a couple st...
by whateverman Explorer in Splunk Search 02-21-2013
2 2
2
2
rtadams89
I'm working on a search which should return all events, except those where the "User_Name" or the "Account_Name" fiel...
by rtadams89 Contributor in Splunk Search 02-21-2013
2 4
2
4
qfjp
I found a field, b1, c1, d1, e1 a1 to the search field. What if you want to view the rest of the fields except for e1...
by qfjp Explorer in Splunk Search 02-21-2013
0 1
0
1
WilliamF
Hi Support team, I just wanna check with you guys on how to detect if logs stopped from regular source? Best regard...
by WilliamF Engager in Splunk Search 02-21-2013
0 1
0
1
timpgray
I am using a subsearch to qualify an outer search. Simplified, it looks something like this: Index =AAAA [index=AAA...
by timpgray Path Finder in Splunk Search 02-21-2013
1 3
1
3
johnpof
Hey Guys, This is my current search (It looks for SQL I/O delays) = sourcetype="WinEventLog:Application" MSSQLSERVER...
by johnpof Path Finder in Splunk Search 02-21-2013
1 7
1
7
mataharry
How to figure which events are broken or truncated by splunk. I know that the default is 256 lines for multiline even...
by mataharry Communicator in Splunk Search 02-21-2013
1 3
1
3
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...