Splunk Search that uses JSON Parameters
I have a search query that shows server health status.
Show Server Status in Splunk
I want to create a Splunk table that shows server status.
Show Server Status in Splunk
I want to create a Splunk table that shows server status.
Should HEC token in Splunk be encrypted?
I am sending logs to Splunk, during peer review I got question if we shouldn’t encrypt token.
Does it make sense to encrypt token? It’s not any secret, if I understand correctly.
Splunk query to get uncommon result
Hi I want a simple query which will return a uncommon values from. currently below query returns union of both Expected and Actual i.e. “Xray,Perform,Report,Hyper,Xray,Perform”
I want result like “Report,Hyper”.
Splunk: rex search for a specific pattern
I have a splunk query that has following text in message field – “message”:”sypher:[tokenized] build successful -xxxxy {“data”:{account_id”:”ABC123XYZ”,”activity”:{“time”:”2024-05-31T12:37:25Z}}”
account_id”:”ABC123XYZ”,”activity
I need to extract value ABC123XYZ which is between account_id”:” AND “,”activity. I tried the following query buty it’s not returning any data. I’d appreciate any help with this query
rex search for a specific pattern
I have a splunk query that has following text in message field – “message”:”sypher:[tokenized] build successful -xxxxy {“data”:{account_id”:”ABC123XYZ”,”activity”:{“time”:”2024-05-31T12:37:25Z}}”
account_id”:”ABC123XYZ”,”activity
I need to extract value ABC123XYZ which is between account_id”:” AND “,”activity. I tried the following query buty it’s not returning any data. I’d appreciate any help with this query
Moving data from search head to non-monitored file
I have a search that produces a list of IP addresses and have a file that is not monitored by Splunk with an existing list of IP addresses. I want to add the list of addresses to said file but am limited in that I cannot create any files or use a script.