Hi there: I have two events shown below: Event #1 source=foo1 eventid=abcd Event #2 source=foo2 event_id=abcd I am trying to query the above events. The event source is different. One is foo1...
Hello everyone and Happy New Year 🙂 I'm newbie with splunk. And I try to make a full dynamique dashboard with the app Search & Reporting. I work on Talend's logs. I'm looking f...
Hi,
I have a log with several transactions, each one have some events. All event in one transaction share the same ID. The other events contains some information each one, for example, execution ti...
Let's say im running a search where I want to look at domains traveled to. index=web_traffic sourcetype=domains domain IN ("*.com", "*.org*", "*.edu*") I want to do a count on how domains that h...
Hi Team, I have created a federated provider and test connection successful . what will be our next steps ? is federated index mandatory to create ? if yes all the indexes across SHs should be cre...
I ran this search on splunk cloud web and I got the results below. Can anyone help on how to resolve
index=_internal source=*/splunkforwarder/var/log/splunk/splunkd.log OR source=*S...
...alue pairs) from each test. Ideally would like to create dashboard charts showing response from Motor and Fan tests among others. Here is a sample search i have been using which allows me to c...
This would be a piece of cake for someone who uses SPLUNK. I am doing a search using the 'stats', çount' and sort commands in the botsv1 index. I am to find the top ten URI's in ascending o...
Hi, I'm trying to put together some search queries for some common anomaly detection. I've been trying to find ones for these issues and I seem to come up with nothing. Some c...