|
Answer» Many Splunk commands are AVAILABLE, including those related to searching, correlation, data or indexing, and identifying specific fields. Following are some of the basic Splunk commands: - Accum: Maintains a running total of a numeric FIELD.
- Bucketdir: Replaces a field value with a higher-level grouping, just like replacing filenames with directories.
- Chart: Provides results in a tabular format for charting.
- Timechart: Creates a time SERIES chart and the corresponding statistics table.
- Rare: Displays the values that are least common in a field.
- Cluster: Groups/clusters similar EVENTS together.
- Delta: Calculates the difference between two search results.
- Eval: Calculates the expression and stores the result in a field.
- GAUGE: Converts the output result into a format compatible with gauge chart types.
- K-means: Perform K-means clustering for selected fields.
- Top: Shows/displays the most common values of a field that are mostly used.
|