Questions tagged [splunk-query]
697 questions
1
vote
1 answer
Show the sum of an event per day by user in Splunk
I want to be able to show the sum of an event (let's say clicks) per day but broken down by user type. The results I'm looking for will look like this:
User Role
01/01
01/02
01/03
...
Guest
500
450
348
55
Admin
220
200
150
75
Here is…

gregwhitworth
- 2,136
- 4
- 22
- 33
1
vote
2 answers
Splunk Enterprise SPL search combine multiple field values into 1 field
I have the following log…

g t
- 21
- 4
1
vote
1 answer
Filtering out holidays in Splunk
I am attempting to use a search lookup table csv to filter out holidays for some Splunk queries.
To do this, I created a holidays.csv in the following style:
dateof,dateafter,description
01/17/2022,01/18/2022,MLK Day…

parricc
- 49
- 4
1
vote
0 answers
How can I keep the thousands separator when exporting a Splunk Dashboard to PDF?
Is there a way to have the thousands separator in a table when exporting to pdf?
When I load the dashboard in Splunk, it shows the thousands separator in a table.
But when I export it to PDF, the thousands separator is not displayed.

Prashanth Srinivasan
- 11
- 1
1
vote
1 answer
How do I check if Splunk has received logs from hundreds of different sources/hosts/devices?
I am relatively new to a company that has used Splunk Professional Services to spin up a Splunk Cloud environment. The company IT has onboarded a lot of AWS, Azure, on-prem and network devices so far. I’m trying to verify that they are in fact…

Jon_Snow1
- 11
- 2
1
vote
1 answer
How to combine count from two different mstats in where clause Splunk?
query 1
| mstats count(_value) as count1 WHERE metric_name="*metric1*" AND metric_type=c AND status="success" by metric_name,env,status
| where count1>0
query 2
| mstats count(_value) as count2 WHERE metric_name="*metric2*" AND metric_type=c AND…

user3749031
- 33
- 1
- 7
1
vote
0 answers
Calling REST API on splunk alerts and incidents using Postman
I am trying to fetch Splunk alerts, incidents data using GET with Postman. I am getting an HTTP 200 response, but the response is in HTML format with the following error:
"Splunk relies on JavaScript to function properly. Please enable JavaScript…

Lakshmi S
- 23
- 2
1
vote
1 answer
Get rid of characters between two characters in Splunk
I'm currently facing a little problem.
I'm a beginner with Splunk, and I need to print a temperature in a single value widget.
I want the temperature to have °C at the end.
When I'm doing this: | eval value = value +"°C"
The printed value is 80.00…

OrnSkry
- 13
- 2
1
vote
1 answer
Can Splunk read inside a file and filter based on a word inside?
I want to create an alert for hosts file modification.
Found the build in one here on the forums but I would like to add a filter that can read inside the file and when it's being modified by Docker, it would ignore and won't activate the…

BestestCohen
- 11
- 1
1
vote
1 answer
Reading a field from a JSON log in Splunk using SPATH
I am trying to read an attribute from a Splunk log that looks like this
context=context{version="1.1.2", id="123", userId=""}
I need to get count by version
My Splunk query :
index="$index" "$filterString" | spath input=context output=versionId…

Anuja Barve
- 300
- 1
- 4
- 23
1
vote
1 answer
Trying to use a columns value as a key to a different column for my results id like to output
I have two columns per event I am trying to use. Well call these col1 and UknownRandomColumnName (urcn for short) .
The key of urcn changes from event to event and is unknown prior to search time, but the value of col1 will always be the key of…

tilted
- 296
- 2
- 17
1
vote
1 answer
Splunk - Share data set across multiple queries
I have event logs in a Splunk index. I want to get the number of a) successful requests and b) failed requests based on statusCode over the last week. However, I want to show the number of each for each day.
From my understanding, I can execute a…

Developer
- 89
- 1
- 4
1
vote
1 answer
Can we use delta command to get a difference between current & previous value which have the same unique id?
I'm trying to find a difference between current & previous value of AOV (Avg value) which have the same unique ID (country). Right now my query gets the difference but doesn't respect the unique IDs. Any help or suggestion would be…

Nishant
- 29
- 1
- 5
1
vote
1 answer
Assign Nested Value to Variable in Splunk
I have an event log in Splunk that looks like this:
{
"event": {
"Id":"12345",
"Name": "My Event",
"Inputs": {
"Param1":"some value",
"Param2":"another value"
},
"Result": {
"statusCode":"304"
}
}
}
I…

Dev
- 921
- 4
- 14
- 31
1
vote
2 answers
Splunk Query to find all the occurrences of a Boolean key value pair in logs over a period of time
Given below is a snippet of splunk event. My requirement is to find all the occurrences of "isOutstanding": true. Here the point to note is that one event may/may not have multiple occurrences. Need to find the total count from multiple events over…

remya thekkuvettil
- 778
- 1
- 7
- 22