- Home - Splunk Community
Learn more about the Splunk Community and how we can help Community Blog Community happenings, product announcements, and Splunk news Learning Paths Discover Community and Learning Resources for your Role User Groups Meet up with other Splunk practitioners, virtually or in-person Office Hours Webinar-style deep dives and workshops for hands-on
- SignalFlow: What? Why? How? - Splunk Community
What is SignalFlow? Splunk Observability Cloud’s analytics engine, SignalFlow, opens up a world of in-depth analysis on your incoming telemetry data SignalFlow is the computational backbone that powers all charts and detectors in Splunk Observability Cloud, but the statistical computation engine a
- Can I use the IN command like this? - Splunk Community
index=myIndex FieldA="A" AND LogonType IN (4,5,8,9,10,11,12) The documentation says it is used with "eval" or "where" and returns only the value "true" But it also seems to work as described above Now I'm unsure if this is "failsafe" as an initial search
- Purpose of the AS statement in SPLUNK - Splunk Community
Solved: Hi, What is the purpose of the AS statement in splunk? I thought, when used, it creates an alias of a column field as it does in SQL,
- Greater Than Less Than or Equal To - Splunk Community
Hi, I wonder whether someone may be able to help me please I've created the line below which is part of a bigger query |eval groupduration=case(duration<=300,"<5 minutes", >300 AND <=600, "Between 5 10 Minutes") The problem I have is around this part >300 AND <=600, where I would like say where
- Product News Announcements - Splunk Community
All the latest news and announcements about Splunk products Subscribe and never miss an update!
- query on using AND ,OR - Splunk Community
CONCERNING THE QUERY, splunk proces from left to right, But NOTE THAT all the search element are always process AND NO Matter the order of OR and AND the other of the resulting events will be the same if you don't SORT or transform it
- How to properly use OR and WHERE in splunk
Hi, I'm new to splunk, my background is mainly in java and sql I was just wondering, what does the operator "OR" mean in splunk, does it have a different meaning? for example, am i using it correct in this instance: host = x OR host = y | Futhermore, I was told the key word "WHERE" has a different
|