...234eventsub', domainName: 'common', appName: 'authentication', containerName: 'root', containerVersion: '0.0.973' } i am unable to extract eventType and eventSubtype because of text "Logging i...
I'm having difficulty ingesting log data from flat files into Splunk. I'm monitoring six different directories, each containing 100-1000 log files, some of which are historical and will require less ...
My first search with regex as following: index=bigip "Storefront_v243" | rex ".*Common:(?<sid>.*?): New session from client IP (?<ip>.*?) \(ST.*\) at VIP 123.45.78.172" With my s...
I'm using the Splunk .Net logging library on Github to interface to the Splunk HTTP Event Collector.
My question is, how to set the Metadata field using the following example:
var ecSe...
I've written this RSysLog configuration file, which allows network based devices to send their event logging streams to a centralised RSysLog server(s), and the each incoming event will be placed int...
...ifferent things. They share a common field that is unique per request. I'd like to join these two files in a splunk search. I've easily whipped up a search using join which seems to work, however t...
Hi,
How can we associate log entries that lead to a particular issue.
I mean suppose there is button click event(Say some form submission), if it fails then the log entries will be different fr...
Hi, I am currently working on developing a logger in Python that would send Syslog data into Splunk. So, I want to create a logging interface or an abstract class that would create a loggin...