Splunk Search

Splunk Search
Community Activity
mbasharat
I need to monitor a text file. Each line in this file is considered an event. There are three different types of even...
by mbasharat Builder in Splunk Search 07-28-2019
0 11
0
11
arusoft
I created a baseline by adding eval field as shown below: | eval BaseLine=1000|fields _time, ResponeTime, BaseLine ...
by arusoft Communicator in Splunk Search 07-28-2019
0 2
0
2
a212830
Hi, I'm trying to use eval for hosts, and need to use wildcards. I tried the following, but it's not working. How...
by a212830 Champion in Splunk Search 07-28-2019
0 4
0
4
amaurya1
DON'T GET INTIMIDATED BY THE LENGTH OF THE QUESTION. I'm getting account numbers from the first three queries. I wan...
by amaurya1 Explorer in Splunk Search 07-28-2019
0 6
0
6
andreyglauzer
I have events similar to these: component, technology, mydate silva, java, 06/20/2019 souza, java, 06/20/2019 silva,...
by andreyglauzer New Member in Splunk Search 07-28-2019
0 6
0
6
lbrhyne
New to Splunk and having a difficult time returning the correct results. The below query works... meaning that it con...
by lbrhyne Path Finder in Splunk Search 07-28-2019
0 4
0
4
amunag439
I have the following logs where the output can be from application or database or from third party source. id=11111 ...
by amunag439 Explorer in Splunk Search 07-28-2019
0 2
0
2
ayushmaan
Hi all, We are having trouble regarding a query in which we need to display multiple metric_labels of a host in a sin...
by ayushmaan Explorer in Splunk Search 07-28-2019
0 2
0
2
guptap2
There are 2 searches from 2 different sources that are fetching file name details in column A and B respectively. We...
by guptap2 New Member in Splunk Search 07-28-2019
0 6
0
6
twh1
I am getting my input in json format like below, {"message":{"SID":"DEV","TIMESTAMP":1563095600,"PARAMS":[{"PROC_COD...
by twh1 Communicator in Splunk Search 07-27-2019
0 12
0
12
ips_mandar
I want to keep specific events which contains few strings in event but around 30 OR statement I have to write in rege...
by ips_mandar Builder in Splunk Search 07-27-2019
0 6
0
6
splunkuseradmin
Hey all, I need an eval expression for the below output: _time minutes bminutes 2019-06-01 1349511.54 105472800 2...
by splunkuseradmin Path Finder in Splunk Search 07-27-2019
0 3
0
3
pench2k19
Hi Team, I am not able to get the values for SLA Time and time_diff_epoch. when i am running two queirs indviduall...
by pench2k19 Explorer in Splunk Search 07-26-2019
0 3
0
3
dajjohns
Hello, my red team just did an engagement against Splunk and among their findings is a SSRF vulnerability and so far,...
by dajjohns Engager in Splunk Search 07-26-2019
0 0
0
0
amunag439
I have the following log sets, one for success case and one for the failure case Success: id=11111 msg=Begin process...
by amunag439 Explorer in Splunk Search 07-26-2019
1 4
1
4
paksan32
Hi Everyone, So we are using SPlunk Cloud and I have created a dashboard that searches for the top 100 most reoccurri...
by paksan32 New Member in Splunk Search 07-26-2019
0 4
0
4
cblanton
https://docs.splunk.com/Documentation/Splunk/7.3.0/SearchReference/ConditionalFunctions#if.28X.2CY.2CZ.29 I'm trying...
by cblanton Communicator in Splunk Search 07-26-2019
0 5
0
5
brinley
I have quite a bit of single-value fields in my dataset which really should be multi-value fields. They are all forma...
by brinley Path Finder in Splunk Search 07-26-2019
0 2
0
2
mbasharat
Hi, I have a field in my data that is called "date". This "date" is when a vulnerability was seen the first time. I ...
by mbasharat Builder in Splunk Search 07-26-2019
0 1
0
1
sakeebhossain
I have a table which has a store_id, a shopper_id. For example (1, 5231). Each store_id corresponds to a the store na...
by sakeebhossain Explorer in Splunk Search 07-26-2019
1 3
1
3
splunkuseradmin
hi all, I am trying to extract field from Splunk "extract more fields" feature, its not showing as the logs in events...
by splunkuseradmin Path Finder in Splunk Search 07-26-2019
0 2
0
2
evilrsa
Did a little bit of searching, but didn't really find what I needed, but I also don't know if I'm even searching the ...
by evilrsa New Member in Splunk Search 07-26-2019
0 1
0
1
sloshburch
I know that indexed fields accelerate search performance. Many searches take advantage of this with host, source, and...
by sloshburch Ultra Champion in Splunk Search 07-26-2019
1 14
1
14
a238574
I am using the stats count function to get a count of unique events. as part of the list I am want to show additional...
by a238574 Path Finder in Splunk Search 07-26-2019
0 3
0
3
splunk6161
I have a savedsearch (reports) that i want to use as lookup, it is possible? Should i use it as subsearch?
by splunk6161 Path Finder in Splunk Search 07-26-2019
0 4
0
4
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...
Top Solution Authors