Splunk Search

Splunk Search
Community Activity
bibekmantree
I am doing search on data coming from fluentd k8s. On top of that data , I wanted to filter on basis of field. A...
by bibekmantree New Member in Splunk Search 07-29-2019
0 5
0
5
aarichow
I have two different indexes, with the common field being username. One index that contains phishing history data. ...
by aarichow Explorer in Splunk Search 07-28-2019
3 5
3
5
mbasharat
I need to monitor a text file. Each line in this file is considered an event. There are three different types of even...
by mbasharat Builder in Splunk Search 07-28-2019
0 11
0
11
arusoft
I created a baseline by adding eval field as shown below: | eval BaseLine=1000|fields _time, ResponeTime, BaseLine ...
by arusoft Communicator in Splunk Search 07-28-2019
0 2
0
2
a212830
Hi, I'm trying to use eval for hosts, and need to use wildcards. I tried the following, but it's not working. How...
by a212830 Champion in Splunk Search 07-28-2019
0 4
0
4
amaurya1
DON'T GET INTIMIDATED BY THE LENGTH OF THE QUESTION. I'm getting account numbers from the first three queries. I wan...
by amaurya1 Explorer in Splunk Search 07-28-2019
0 6
0
6
andreyglauzer
I have events similar to these: component, technology, mydate silva, java, 06/20/2019 souza, java, 06/20/2019 silva,...
by andreyglauzer New Member in Splunk Search 07-28-2019
0 6
0
6
lbrhyne
New to Splunk and having a difficult time returning the correct results. The below query works... meaning that it con...
by lbrhyne Path Finder in Splunk Search 07-28-2019
0 4
0
4
amunag439
I have the following logs where the output can be from application or database or from third party source. id=11111 ...
by amunag439 Explorer in Splunk Search 07-28-2019
0 2
0
2
ayushmaan
Hi all, We are having trouble regarding a query in which we need to display multiple metric_labels of a host in a sin...
by ayushmaan Explorer in Splunk Search 07-28-2019
0 2
0
2
guptap2
There are 2 searches from 2 different sources that are fetching file name details in column A and B respectively. We...
by guptap2 New Member in Splunk Search 07-28-2019
0 6
0
6
twh1
I am getting my input in json format like below, {"message":{"SID":"DEV","TIMESTAMP":1563095600,"PARAMS":[{"PROC_COD...
by twh1 Communicator in Splunk Search 07-27-2019
0 12
0
12
ips_mandar
I want to keep specific events which contains few strings in event but around 30 OR statement I have to write in rege...
by ips_mandar Builder in Splunk Search 07-27-2019
0 6
0
6
splunkuseradmin
Hey all, I need an eval expression for the below output: _time minutes bminutes 2019-06-01 1349511.54 105472800 2...
by splunkuseradmin Path Finder in Splunk Search 07-27-2019
0 3
0
3
pench2k19
Hi Team, I am not able to get the values for SLA Time and time_diff_epoch. when i am running two queirs indviduall...
by pench2k19 Explorer in Splunk Search 07-26-2019
0 3
0
3
dajjohns
Hello, my red team just did an engagement against Splunk and among their findings is a SSRF vulnerability and so far,...
by dajjohns Engager in Splunk Search 07-26-2019
0 0
0
0
amunag439
I have the following log sets, one for success case and one for the failure case Success: id=11111 msg=Begin process...
by amunag439 Explorer in Splunk Search 07-26-2019
1 4
1
4
paksan32
Hi Everyone, So we are using SPlunk Cloud and I have created a dashboard that searches for the top 100 most reoccurri...
by paksan32 New Member in Splunk Search 07-26-2019
0 4
0
4
cblanton
https://docs.splunk.com/Documentation/Splunk/7.3.0/SearchReference/ConditionalFunctions#if.28X.2CY.2CZ.29 I'm trying...
by cblanton Communicator in Splunk Search 07-26-2019
0 5
0
5
brinley
I have quite a bit of single-value fields in my dataset which really should be multi-value fields. They are all forma...
by brinley Path Finder in Splunk Search 07-26-2019
0 2
0
2
mbasharat
Hi, I have a field in my data that is called "date". This "date" is when a vulnerability was seen the first time. I ...
by mbasharat Builder in Splunk Search 07-26-2019
0 1
0
1
sakeebhossain
I have a table which has a store_id, a shopper_id. For example (1, 5231). Each store_id corresponds to a the store na...
by sakeebhossain Explorer in Splunk Search 07-26-2019
1 3
1
3
splunkuseradmin
hi all, I am trying to extract field from Splunk "extract more fields" feature, its not showing as the logs in events...
by splunkuseradmin Path Finder in Splunk Search 07-26-2019
0 2
0
2
evilrsa
Did a little bit of searching, but didn't really find what I needed, but I also don't know if I'm even searching the ...
by evilrsa New Member in Splunk Search 07-26-2019
0 1
0
1
sloshburch
I know that indexed fields accelerate search performance. Many searches take advantage of this with host, source, and...
by sloshburch Ultra Champion in Splunk Search 07-26-2019
1 14
1
14
Get Updates on the Splunk Community!

Build the Future of Agentic AI: Join the Splunk Agentic Ops Hackathon

AI is changing how teams investigate incidents, detect threats, automate workflows, and build intelligent ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...