Splunk

From neil.tappsville.com
Revision as of 15:05, 11 April 2020 by Gonzo (talk | contribs)
Jump to navigationJump to search

Match Value (.*) after "want:" and turn it into a field (field_name)

 | rex field=_raw "some text before what we want:(?<field_name>.*)"  

Group results into 1 hour chunks

 | timechart span=1h count(field_name) by field_name 

Export RAW logs

host=<host_name> | table _raw | outputcsv rawdump.csv

Then download as csv