Thanks but once I selected the statistics table format it created a table with the event information in a single table called _raw rather than parsing the event fields into separate columns as I did in step 2 in which I was able to select the fields (columns) and move their order as well.
... View more
After creating a search I have formatted the events into table format with only the fields I am interested on.
Then this search was saved as a report and added into the dashboard.
In the dashboard, instead of seen the same table, I see a list of event rows.
I am a new user, so what am I missing? My expectation is to
1. create a search
2. Format the search results into a table
3. Save as report
4. Add to the dashboard
Expecting the dashboard to show the same table formatted in step 2.
... View more
Thank you, Renjith.
I am a new user, so when you mentioned "you can create an alert when a new source is created by comparing the count with previous one or looking for a specific event from the new file etc."
Are these the steps to perform the above?
1. Go to Search and type the count comparison
2. Save this as an alert
Could you give a link or a sample syntax to do the comparison?
... View more
As of today, is there a way to simply monitor a folder for new files created on it?
Right now, I am monitoring a folder via Data Input > Folder, and Splunk is listing the 5 lines of the single .txt file on that folder.
When, I just need to trigger an alert when a new file is added to that folder.
... View more