Skip to content

Category: Search Command of the Week

Splunk Search Command Of The Week: coalesce

Using the coalesce Command

Data fields that have similar information can have different field names. While the Splunk Common Information Model (CIM) exists to address this type of situation,

Splunk Search Command Of The Week: where

Using the where Command

What is the Splunk where Command? The Splunk where command is one of several options used to filter search results. It uses eval-expressions that return

Splunk Search Command Of The Week: strftime

Using the strftime Command

One of the most important elements of indexing and searching for logs in Splunk is properly dealing with timestamps. Properly tracking time enables you to

Splunk Search Command Of The Week: dedup

Using the dedup Command

What is the Splunk dedup Command? The Splunk dedup command, short for “deduplication”, is an SPL command that eliminates duplicate values in fields, thereby reducing

Splunk Search Command Of The Week: spath

Using the spath Command

Your dilemma: You have XML or JSON data indexed in Splunk as standard event-type data. Sure, you’d prefer to have brought it in as an

search command of the week

Splunk STATS Command

  Here’s the situation: You’re a security analyst that’s been tasked with finding different attacks on your servers. You need to find various events relating