...R sourcetype=yyy) NOT host="oo" | fieldsummary | eval test="xxx" | eval reference="yyy" | table field test field reference
I know it's wrong, but that's where I am at the moment. I need to have m...
Hello, I have XML data as values of requestbody field in Splunk search below, need field summary on the break down of XML data, XML data is complex one and provided a sample of the XML data, how to ...
...-get samples for all indexes in which the sourcetype appears``` | dedup 10 index sourcetype | fieldsummary ```3-determine field coverage so we can pick the hallmark fields``` | eventstats max(c...
I have events with JSON in them and I need to know what % of the time each field appears.
The fieldset in the events is not consistent, sometimes an event has many, sometimes only a few, the name ...
...earch, Splunk 6.0 will only allow itself to automatically extract about 100 more fields.
This really prevents certain commands like fieldsummary or transpose from working properly.
B...
I am using Splunk ES and trying to match my IDS logs to the Intrusion Detection data model. I thought I did all preparatory steps required but when clicking in the ES app Search > Datasets > ...
...ield Value Count %
All user ALL 99 99%
Top 1 user abc 12 12%
Top 2 ...
Bottom 1 user xyz 13 13%
All dest ALL 98 98%
...
Maybe it will involve append using top and rare, or perhaps fieldsummary? b...
Hello
How can I get only results for specific fields where field name is like something ?
fx.
get all fields which have "status" in their field name.
I tried this but It doesnt work:
st...