Getting Data In

How to filter fields in exporting logs into csv in Web GUI?

kristen
Explorer

I am sampling the logs of the last 24 hours in GUI by
1. search queries: index=*

2. On GUI timeframe options, select last24 hours

3. Click search

4. Search completed

5. Export results to csv

 

In the csv obtained, it is seen that it parsed all of the fields in each event log into a new column, resulting too many columns in the csv. I would only like to export _raw, timestamp, host into the csv. Would there be any suggestion? Thank you.

Labels (1)
0 Karma
1 Solution

kristen
Explorer

Just utilize table command. e.g.:

index=* earliest=timestamp latest=timestamp|table _raw, _time, host

View solution in original post

0 Karma

kristen
Explorer

Just utilize table command. e.g.:

index=* earliest=timestamp latest=timestamp|table _raw, _time, host

0 Karma
Get Updates on the Splunk Community!

Combine Multiline Logs into a Single Event with SOCK - a Guide for Advanced Users

This article is the continuation of the “Combine multiline logs into a single event with SOCK - a step-by-step ...

Everything Community at .conf24!

You may have seen mention of the .conf Community Zone 'round these parts and found yourself wondering what ...

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...