I have multiple servers for which I am monitoring event logs via Splunk. The servers are owned by different teams. There is no information about team in the event log messages. I want to group the s...
...ercent as "%" Wich give me this result. I also need to group it by 10m time range and calculate the difference in percents between 2 previous time ranges for every line. Help me figure o...
...019 | 4444 | PUT /data4
10.31 2019 | 4444 | data verified
10.32 2019 | 4444 | 201 Created
Every HTTP request has a unique correlation ID and is maintained till the request either gets failed or s...
...pisodes
index=itsi_grouped_alerts , comparing event_id and itsi_group_id
This is happening randomly.
I see the dashboard on the ITSI healthcheck, that show me the multiple grouping.
What c...
Hi All, We have a number of micro services with correlation id flowing across the request and responses. What i'm trying to do is to create a flow of request and response for 1 correlation id. E...
...ranslation (NAT) and thus events don't share common src_ip or dst_ip in all cases.
I'm familiar with transactions, and they are great, but only when each event involved in the correlation shares a...
...,"SUCCESS","ERROR REPORTED") | table request_id,result,DateTime
Basically, I am grouping with correlation id, once grouped i need timestamp of any event. (Screenshot below)
I have a series of differently-shaped JSON events indexed into Splunk (as JSON). They have a correlation id to link the events into "interactions".
Example events that form an i...
Hi Team, We are getting the Dynatrace metrics and log4j logs to Splunk ITSI. Currently we created the universal correlation search manually (which needs fine tuning whenever needed) for grouping n...