Splunk : Discussion on tag knowledge object and "tags" command

Поділитися
Вставка
  • Опубліковано 14 жов 2024

КОМЕНТАРІ • 7

  • @sajalbansal8586
    @sajalbansal8586 3 роки тому

    Great explanation...specially the difference between event types and tags made it very clear.

  • @TheSharkdba
    @TheSharkdba 4 роки тому

    Very well explained. Waiting for your CIM video and how it relates to tagging.

  • @rajenderprasad1193
    @rajenderprasad1193 4 роки тому

    Best as always.. I have a doubt.. I have two different indexes.. and response time is in one index is totaltime but in another index it is elapsedtime.. is it possible to make both of them to single field..

    • @splunk_ml
      @splunk_ml  4 роки тому

      yes...you can use fieldalias for this kind of purpose.

  • @valarmathijaganathan6694
    @valarmathijaganathan6694 3 роки тому

    Excellent explanation

  • @tibuuso
    @tibuuso 4 роки тому

    How would you do for IP Subnets? For example, I want to map Subnet into following group/zone. 192.168.0.0/24 -> Apache, 192.168.1.0/24 -> DMZ DNS, 10.0.10.0/24 -> DB Cluster. Then after that, Apache & DMZ DNS will be again grouped as External Host and DB Cluster as Internal Host. Can you share reference on how I might be able to do about these two requirements?

    • @splunk_ml
      @splunk_ml  4 роки тому +1

      well you can create event types for "Apache", "DMZ DNS" and "DB cluster" type events. In the event type query you can use regex command to filter the data. Then you can create those tags on thos event types.
      community.splunk.com/t5/Splunk-Search/regex-for-event-type/m-p/39888#:~:text=The%20'regex'%20command%20in%20splunk,use%20the%20'rex'%20command.&text=12%3A13%20AM-,You%20can%20create%20an%20event%20type%20based%20on%20a%20search,to%20match%20against%20your%20expression.