Hello All,
I am new to Splunk.
My Splunk index is already getting data from a Kafka source
index=k_index sourcetype=k_message The query result is something like
{Field1=abc,Field2=sdfs,Field3=wertw,Field4=123,Field6=87089R....}
I have got a use case where I have a list of fields and associated datatypes,
I want to compare these predefined fields (fields only - no values) against the Splunk search query results and then for each mismatch in the result, needs to keep count of it and produce it as a percentage of the total. In short, give a score if the incoming events in the last 15 mins are good (like 100% or 90% ….etc)
Thanks,
Alwyn
... View more