Skip to content

Tag: Splunk

Splunk Search Command Of The Week: Map

Using the map Command

When it comes to correlating information in searches to uncover unique patterns, there are several Splunk commands are commonly employed. For instance, you might opt

Splunk Metrics Indexes Series: Part 2: Creating Metrics Indexes

Creating Metrics Indexes

This topic is split into a nine-part series to improve readability – this second installment covers how to create a metrics index. Parts 1-3 of

Splunk Metrics Indexes Series: Part 1: Comparing Events & Metrics Indexes

Events vs Metrics Indexes

This topic is split into a nine-part series to improve readability – this is the first installment in the series. Parts 1-3 of this series

Splunk Search Command Of The Week: mvjoin

Using the mvjoin Command

Data that has multiple values in a single field can be difficult to view in a report. Using the mvjoin command from Splunk’s Search Processing

Splunk Search Command Of The Week: coalesce

Using the coalesce Command

Data fields that have similar information can have different field names. While the Splunk Common Information Model (CIM) exists to address this type of situation,

Splunk Search Command Of The Week: where

Using the where Command

What is the Splunk where Command? The Splunk where command is one of several options used to filter search results. It uses eval-expressions that return

Splunk Search Command Of The Week: strftime

Using the strftime Command

One of the most important elements of indexing and searching for logs in Splunk is properly dealing with timestamps. Properly tracking time enables you to

Splunk Search Command Of The Week: spath

Using the spath Command

Your dilemma: You have XML or JSON data indexed in Splunk as standard event-type data. Sure, you’d prefer to have brought it in as an