Splunk Search

token. how can I, configuring one token for filter search?

medvelsplunk
Engager

Hi

I have this search in my dashboard and i want create a token filter for search the result of the field "sucursal_id"

host="iperf01app" NOT sourcetype=log-4 status="error" OR ("SUM" AND sentido="*") | rex field=source "(?[\d]+).txt"
| eval sucursal_id=case(sucursal_id > "999000" AND sucursal < "999999" , (sucursal_id - 999000), sucursal_id > "9999000" AND sucursal < "9999999" , (sucursal_id - 9999000), sucursal_id > "99999000" AND sucursal < "99999999" , (sucursal_id - 99999000), sucursal_id < 9999, sucursal_id)
| eval velocidad=if(status == "error" , "0", velocidad) | eval vel_bajada=case(sentido = "receiver" OR velocidad = 0, velocidad/1000) | eval vel_subida=case(sentido = "sender" OR velocidad = 0, velocidad/1000) | stats avg(vel_subida) as "Velocidad Subida", avg(vel_bajada) as "Velocidad Bajada" by sucursal_id |

regards

Tags (1)
0 Karma

nagarjuna280
Communicator

add at the end

|sucursal_id=$sucursal_id$
click on "add input" on your dashboard and select the text box and give the token name "sucursal_id"

If this not you are expecting, explain your question clearly.

0 Karma

medvelsplunk
Engager

Tanks

Now, in the dashboard configuration , i have to choose option "tokens" in the section "time range"

Regards

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...