I'm trying to divide my query into two parts, D>8000 as X and D<=8000 as Y, so i put it .... my search | eval count(if(D<=8000)) AS Y, count(if(D>8000)) AS X | transpose.....................
I would like to index less data into Splunk by modifying several XML sources so that I'm only including certain fields and formatting it as a key-value pairs. I believe I can do this by creating a s...
Hi...here is my search:
sourcetype="isc:dhcp" earliest=-10m@s latest=now | stats count as dhcp_count by _time | where dhcp_count<5000
I'll usually get returned stats:
4800
10,0...
I'm working on a search that evaluates events for a specific index/sourcetype combination; the events reflect SSO information regarding user authentication success as well as applications the user ha...
Hi Splunk community,
I have this query
source=main |
transaction user_id |
chart count as Attempts, count(eval(isp_event_type!="authentication_succeeded")) as Failed, count(eval(isp_event_t...
Hi everyone
Is it a way to use less css pre processor in splunk simple xml views?
Any link or ressource on how to use less in splunk will be welcome.
Thanks
I have logs with to and from email address like so:
..... from=<mickey.mouse@disney.com> .....
..... to=<minnie.mouse@disney.com> .....
As you can guess, Splunk nicely parses the...
I have a search using the splunk table commands, but the text in one fields is too long so that I can't see the whole result in one screen, is there a way to show only the first 30 characters in that...
Hi,
let's say I want to create a 5 step-funnel for customers depending on their max step.
My first approach would be like
...
| stats max(funnel_step) AS max_step BY customer
| stats dc(...