...407|| should be temp=1407
values after >>>>||1407|| should be message=[POD CleanUp] File deleted from POD : /dfgd/dfgdfgdfg.dat
Here is the sample log:
{"source":"fdgdfdfg","log":"2023-0...
Hi All,
I have lookup file with 2 columns, Col1 and SPL_Qry.
Each value in col1 will have associated Splunk query.
In Dashboard, if I select ant value from the Drop Down, associated Query s...
I'm using the map command to iterate through a list of devices and forecasting some of the metrics associated with each device. That's all working but what I really want is to then average the ...
Hello Splunk Community,
I'm trying to extract fields from the cloudwatch events like 1)region 2)arn 3) startTime 4) endTime 5)eventTypeCode 6)latestDescription from an event. The regex w...
Hi splunkers,
I m using cluster master and indexers in spk 8.2.5
When I start my search heads, I got the error "master_uri. This setting is deprecated and might be removed entirely in a future re...
Hello,
I have some issues with field extraction since value pair and non-value pair fields are within the same event. Not sure how implement Regex to extract these fields. A few sample events are g...
hello team,
I have data from CSV files coming into my Splunk instance, I can search and find that data.
However, they come together in the "Event" field, and I would like to separate them based o...
How to perform lookup from index search with dbxquery? | index=vulnerability_index | table ip_address, vulnerability, score ip_address vulnerability score 192.168.1.1 SQL Injection 9...
...HARGETYPE,REASON|rename BUSINESSIDENTIFIER AS "Order ID", SERVICELAYEROPERATION AS "API NAME", REASON AS "OSB Observation"
I need to extract charge type from the OSB Observation column. Sample v...