@@ -74,17 +74,17 @@ In Splunk, you can omit the `search` keyword and specify an unquoted string. In
74
74
75
75
| | | |
76
76
| :---| :---| :---|
77
- | Splunk | ** search** | ` search Session.Id="c8894ffd-e684-43c9-9125-42adc25cd3fc" earliest=-24h ` |
78
- | Log Analytics | ** find** | ` find Session.Id=="c8894ffd-e684-43c9-9125-42adc25cd3fc" and ingestion_time()> ago(24h) ` |
77
+ | Splunk | ** search** | < code > search Session.Id="c8894ffd-e684-43c9-9125-42adc25cd3fc" earliest=-24h</ code > |
78
+ | Log Analytics | ** find** | < code > find Session.Id=="c8894ffd-e684-43c9-9125-42adc25cd3fc" and ingestion_time()> ago(24h)</ code > |
79
79
| | |
80
80
81
81
### Filter
82
82
Azure Log Analytics queries start from a tabular result set where the filter. In Splunk, filtering is the default operation on the current index. You can also use ` where ` operator in Splunk, but it is not recommended.
83
83
84
84
| | | |
85
85
| :---| :---| :---|
86
- | Splunk | ** search** | ` Event.Rule="330009.2" Session.Id="c8894ffd-e684-43c9-9125-42adc25cd3fc" _indextime>-24h ` |
87
- | Log Analytics | ** where** | ` Office_Hub_OHubBGTaskError ` <br >| ; ` where Session_Id == "c8894ffd-e684-43c9-9125-42adc25cd3fc" and ingestion_time() > ago(24h) ` |
86
+ | Splunk | ** search** | < code > Event.Rule="330009.2" Session.Id="c8894ffd-e684-43c9-9125-42adc25cd3fc" _ indextime>-24h</ code > |
87
+ | Log Analytics | ** where** | < code > Office_Hub_OHubBGTaskError<br >| ; where Session_Id == "c8894ffd-e684-43c9-9125-42adc25cd3fc" and ingestion_time() > ago(24h)</ code > |
88
88
| | |
89
89
90
90
@@ -93,8 +93,8 @@ Azure Log Analytics also supports `take` as an alias to `limit`. In Splunk, if t
93
93
94
94
| | | |
95
95
| :---| :---| :---|
96
- | Splunk | ** head** | ` Event.Rule=330009.2 ` <br >| ; ` head 100 ` |
97
- | Log Analytics | ** limit** | ` Office_Hub_OHubBGTaskError ` <br >| ; ` limit 100 ` |
96
+ | Splunk | ** head** | < code > Event.Rule=330009.2<br >| ; head 100< code > |
97
+ | Log Analytics | ** limit** | < code > Office_Hub_OHubBGTaskError<br >| ; limit 100</ code > |
98
98
| | |
99
99
100
100
@@ -104,8 +104,8 @@ For bottom results, in Splunk you use `tail`. In Azure Log Analytics you can spe
104
104
105
105
| | | |
106
106
| :---| :---| :---|
107
- | Splunk | ** head** | ` Event.Rule="330009.2" ` <br >| ; ` sort Event.Sequence ` <br >| ; ` head 20 ` |
108
- | Log Analytics | ** top** | ` Office_Hub_OHubBGTaskError ` <br >| ; ` top 20 by Event_Sequence ` |
107
+ | Splunk | ** head** | < code > Event.Rule="330009.2"` <br>| ` sort Event.Sequence<br >| ; head 20</ code > |
108
+ | Log Analytics | ** top** | < code > Office_Hub_OHubBGTaskError<br >| ; top 20 by Event_Sequence</ code > |
109
109
| | |
110
110
111
111
@@ -116,8 +116,8 @@ Splunk also has an `eval` function, which is not to be comparable with the `eval
116
116
117
117
| | | |
118
118
| :---| :---| :---|
119
- | Splunk | ** eval** | ` Event.Rule=330009.2 ` <br >| ; ` eval state= if(Data.Exception = "0", "success", "error") ` |
120
- | Log Analytics | ** extend** | ` Office_Hub_OHubBGTaskError ` <br >| ; ` extend state = iif(Data_Exception == 0,"success" ,"error") ` |
119
+ | Splunk | ** eval** | < code > Event.Rule=330009.2<br >| ; eval state= if(Data.Exception = "0", "success", "error")</ code > |
120
+ | Log Analytics | ** extend** | < code > Office_Hub_OHubBGTaskError<br >| ; extend state = iif(Data_Exception == 0,"success" ,"error")</ code > |
121
121
| | |
122
122
123
123
@@ -126,8 +126,8 @@ Azure Log Analytics uses the same operator to rename and to create a new field.
126
126
127
127
| | | |
128
128
| :---| :---| :---|
129
- | Splunk | ** rename** | ` Event.Rule=330009.2 ` <br >| ; ` rename Date.Exception as execption ` |
130
- | Log Analytics | ** extend** | ` Office_Hub_OHubBGTaskError ` <br >| ; ` extend execption = Date_Exception ` |
129
+ | Splunk | ** rename** | < code > Event.Rule=330009.2<br >| ; rename Date.Exception as execption</ code > |
130
+ | Log Analytics | ** extend** | < code > Office_Hub_OHubBGTaskError<br >| ; extend execption = Date_Exception</ code > |
131
131
| | |
132
132
133
133
@@ -138,8 +138,8 @@ Splunk does not seem to have an operator similar to `project-away`. You can use
138
138
139
139
| | | |
140
140
| :---| :---| :---|
141
- | Splunk | ** table** | ` Event.Rule=330009.2 ` <br >| ; ` table rule, state ` |
142
- | Log Analytics | ** project** <br >** project-away** | ` Office_Hub_OHubBGTaskError ` <br >| ; ` project exception, state ` |
141
+ | Splunk | ** table** | < code > Event.Rule=330009.2<br >| ; table rule, state</ code > |
142
+ | Log Analytics | ** project** <br >** project-away** | < code > Office_Hub_OHubBGTaskError<br >| ; project exception, state</ code > |
143
143
| | |
144
144
145
145
@@ -149,8 +149,8 @@ See the [Aggregations in Log Analytics queries](aggregations.md) for the differe
149
149
150
150
| | | |
151
151
| :---| :---| :---|
152
- | Splunk | ** stats** | ` search (Rule=120502.*) ` <br >| ; ` stats count by OSEnv, Audience ` |
153
- | Log Analytics | ** summarize** | ` Office_Hub_OHubBGTaskError ` <br >| ; ` summarize count() by App_Platform, Release_Audience ` |
152
+ | Splunk | ** stats** | < code > search (Rule=120502.* )<br >| ; stats count by OSEnv, Audience</ code > |
153
+ | Log Analytics | ** summarize** | < code > Office_Hub_OHubBGTaskError<br >| ; summarize count() by App_Platform, Release_Audience</ code > |
154
154
| | |
155
155
156
156
@@ -160,8 +160,8 @@ Join in Splunk has significant limitations. The subquery has a limit of 10000 re
160
160
161
161
| | | |
162
162
| :---| :---| :---|
163
- | Splunk | ** join** | ` Event.Rule=120103* | stats by Client.Id, Data.Alias | join Client.Id max=0 [ search earliest=-24h Event.Rule="150310.0" Data.Hresult=-2147221040] ` |
164
- | Log Analytics | ** join** | ` cluster("OAriaPPT").database("Office PowerPoint").Office_PowerPoint_PPT_Exceptions ` <br >| ; ` where Data_Hresult== -2147221040 ` <br >| ; ` join kind = inner (Office_System_SystemHealthMetadata ` <br >| ; ` summarize by Client_Id, Data_Alias)on Client_Id ` |
163
+ | Splunk | ** join** | < code > Event.Rule=120103* &# 124 ; stats by Client.Id, Data.Alias | join Client.Id max=0 [ search earliest=-24h Event.Rule="150310.0" Data.Hresult=-2147221040] </ code > |
164
+ | Log Analytics | ** join** | < code > cluster("OAriaPPT").database("Office PowerPoint").Office_PowerPoint_PPT_Exceptions<br >| ; where Data_Hresult== -2147221040<br >| ; join kind = inner (Office_System_SystemHealthMetadata<br >| ; summarize by Client_Id, Data_Alias)on Client_Id</ code > |
165
165
| | |
166
166
167
167
@@ -171,8 +171,8 @@ In Splunk, to sort in ascending order you must use the `reverse` operator. Azure
171
171
172
172
| | | |
173
173
| :---| :---| :---|
174
- | Splunk | ** sort** | ` Event.Rule=120103 ` <br >| ; ` sort Data.Hresult ` <br >| ; ` reverse ` |
175
- | Log Analytics | ** order by** | ` Office_Hub_OHubBGTaskError ` <br >| ; ` order by Data_Hresult, desc ` |
174
+ | Splunk | ** sort** | < code > Event.Rule=120103<br >| ; sort Data.Hresult<br >| ; reverse</ code > |
175
+ | Log Analytics | ** order by** | < code > Office_Hub_OHubBGTaskError<br >| ; order by Data_Hresult, desc</ code > |
176
176
| | |
177
177
178
178
@@ -194,8 +194,8 @@ In the Log Analytics portal, only the first column is exposed. All columns are a
194
194
195
195
| | | |
196
196
| :---| :---| :---|
197
- | Splunk | ** fields** | ` Event.Rule=330009.2 ` <br >| ; ` fields App.Version, App.Platform ` |
198
- | Log Analytics | ** facets** | ` Office_Excel_BI_PivotTableCreate ` <br >| ; ` facet by App_Branch, App_Version ` |
197
+ | Splunk | ** fields** | < code > Event.Rule=330009.2<br >| ; fields App.Version, App.Platform</ code > |
198
+ | Log Analytics | ** facets** | < code > Office_Excel_BI_PivotTableCreate<br >| ; facet by App_Branch, App_Version</ code > |
199
199
| | |
200
200
201
201
@@ -206,8 +206,8 @@ You can use `summarize arg_min()` instead to reverse the order of which record g
206
206
207
207
| | | |
208
208
| :---| :---| :---|
209
- | Splunk | ** dedup** | ` Event.Rule=330009.2 ` <br >| ; ` dedup device_id sortby -batterylife ` |
210
- | Log Analytics | ** summarize arg_max()** | ` Office_Excel_BI_PivotTableCreate ` <br >| ; ` summarize arg_max(batterylife, *) by device_id ` |
209
+ | Splunk | ** dedup** | < code > Event.Rule=330009.2<br >| ; dedup device_id sortby -batterylife</ code > |
210
+ | Log Analytics | ** summarize arg_max()** | < code > Office_Excel_BI_PivotTableCreate<br >| ; summarize arg_max(batterylife, * ) by device_id</ code > |
211
211
| | |
212
212
213
213
0 commit comments