I have an alert which detects when a log feed has failed The team the alert goes to have asked that I allow them to suppress the alert. I have now created a mailto link within the alert email that ...
I have splunk queries that generates 2 different tables having similar fields (METHOD, URI, COUNT). I wanted to do a diff between them based on URI and also the count. Eg: tableA METHOD URI C...
Hi All,
Thanks for your time. I am sorry in advance as this is very basic question. just started exploring the search query.. If i have something like below
index=ADFS_AWS
AND clientId IN ("Abc12...
Hi need to compare total numbers if they are different show table that present them 23:57:05.253 app module: PACK: Total:[1010000] from server1 Total:[C000001010000] 23:57:05.254 app module: P...
...ount alive or dead , example a Goat (alive =2 , dead = 1) diff = alive - dead (1) , and Rabit(alive=1 , dead=1) diff = alive - dead (0), i want to create table of result
Animal | alive | dead | diff...
What are the differences between option "s" and "y"?
index=_internal sourcetype=splunkd | rex mode=sed “s/idx=\d+\.\d+\.\d+\.\d+\:\d+/XX.XXX.XX.XXX:XXXX/g"
index=_internal sourcetype=s...
Hi I am really struggling to find the difference between the 51= time and the 59= time below and add to a separate column My log extract example is 2021-01-06 12:37:57.411 [FIDO1] INFO L...
Hi,
My search query is like this : index=main source=file1.txt | stats values(wrk) as "Work Name", values(name) as "Name", values(folder) as "Folder Name", values(version) as "Version"|transpose |r...
Given I have multiple hosts, I'd like the host total within a bucketed time span, average of the totals across all hosts, and the percentage difference per host compared to the average. E.g.
F...