Splunk Search

Splunk Search
Community Activity
abhayneilam
Hi, When I am running my query with timechart command , OTHER column is being made, I want to expand this column as ...
by abhayneilam Contributor in Splunk Search 07-02-2019
0 3
0
3
sandeepmakkena
| multisearch [ search sourcetype="busevt" OR sourcetype="sysout" TransactionId=TID* AND TransactionId!=TID earl...
by sandeepmakkena Contributor in Splunk Search 07-02-2019
0 6
0
6
mayurmoradiya
hello, i have data in default index "main" and has sourcetype "app" and it has fields like content name, program na...
by mayurmoradiya New Member in Splunk Search 07-02-2019
0 1
0
1
singriajay
Hi, I am getting LTM, ASM, APM logs from F5 devices over UDP port 9514 and I have bifurcated the inputs.conf file ...
by singriajay Explorer in Splunk Search 07-02-2019
0 4
0
4
90509
Hi All, I would like to find out failed login attempts happen more than 6 times with in 1hr time span.So here the m...
by 90509 Engager in Splunk Search 07-02-2019
0 4
0
4
rajaguru2790
A field has multiple lines like a chat log. Below aLL DATA IS in one field of Splunk in the same way as below. Now n...
by rajaguru2790 Explorer in Splunk Search 07-02-2019
0 10
0
10
tariqazeem123
i have data in default index "main" and has sourcetype "app" and field like program_name. i want to find most popula...
by tariqazeem123 New Member in Splunk Search 07-02-2019
0 2
0
2
ali_alnajjar_ve
Hello folks, I've this event from custom data source: 01/07/2019 16:27:08 type=cpu_util SNMP table: HOST-RESOURCES-M...
by ali_alnajjar_ve Explorer in Splunk Search 07-02-2019
0 1
0
1
pgadhari
I have users in different groups and that has to be compared with master_userlist, to show the permissions in the das...
by pgadhari Builder in Splunk Search 07-02-2019
0 18
0
18
wrussell12
How to match a result from 3 fields using an ambiguous lookup. lookup client_type.csv client_id type ...
by wrussell12 Explorer in Splunk Search 07-02-2019
0 0
0
0
tkdguq0110
here's my code <fieldset submitButton="true" autoRun="false"> <input type="text" token="field1"> </fieldset> I wan...
by tkdguq0110 Path Finder in Splunk Search 07-01-2019
1 9
1
9
NAVEEN_CTS
Hi , I'm trying to have Splunk knowledge inventory. Could you help me in building the search to have the table with ...
by NAVEEN_CTS Path Finder in Splunk Search 07-01-2019
0 2
0
2
tariqazeem123
I have data in index "main" and sourcetype "app" and fields "content_name" and "os". So how can I create Top conten...
by tariqazeem123 New Member in Splunk Search 07-01-2019
0 1
0
1
saikumarmacha
I am trying to list failed jobs during an outage with respect to serverIP The first search(Search1) gives us the ou...
by saikumarmacha Engager in Splunk Search 07-01-2019
0 1
0
1
thisissplunk
I have a stacked column in a timechart that currently displays the count for each value in it. See https://imgur.com/...
by thisissplunk Builder in Splunk Search 07-01-2019
0 1
0
1
xploresplunk
I am a new splunk user and I want to create a stats table showing different findings of an event using fields. Howeve...
by xploresplunk New Member in Splunk Search 07-01-2019
0 34
0
34
iparitosh
Exact same query when run via search app returns 0 Statistics but shows correct stats when run via cloud monitoring a...
by iparitosh Path Finder in Splunk Search 07-01-2019
0 2
0
2
nithinms
Hi , I am writing a search which creates a Central Station Incident if satisfies my condition. While doing so I a...
by nithinms New Member in Splunk Search 07-01-2019
0 2
0
2
sandeepmakkena
sourcetype="busevt" OR sourcetype="sysout" TransactionId=TID* AND TransactionId!=TIDearliest=-2w@w1 latest=@h+h | ev...
by sandeepmakkena Contributor in Splunk Search 07-01-2019
0 1
0
1
ssiat479
My apologies if there is an obvious answer to this question, but I have been searching Splunk answers and the documen...
by ssiat479 Engager in Splunk Search 07-01-2019
0 1
0
1
telecomdesign
Hello here is an example of the code I use: index="Test" | append [search (type="1") | stats distinct_count(ID)...
by telecomdesign New Member in Splunk Search 07-01-2019
0 4
0
4
Vfinney
I am trying to parse and extract the field data from AD distinguishedName field using regex, but I'm not having too m...
by Vfinney Observer in Splunk Search 07-01-2019
0 7
0
7
paragvidhi
Hi All, I am new to Splunk, I am looking for dynamic field creation based on a comparison between two fields value. ...
by paragvidhi Engager in Splunk Search 07-01-2019
0 3
0
3
lucasdc
I have this search 1: index=br_activedirectory_microsoft EventCode=4624 Account_Domain=AGBANESPA Account_Name=A* |...
by lucasdc New Member in Splunk Search 07-01-2019
0 4
0
4
ehowardl3
I have three data sources that I need to correlate together, I'll simplify it for sake of example: Index A: _time, f...
by ehowardl3 Path Finder in Splunk Search 07-01-2019
0 3
0
3
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...