What command is used la compute find write summary statistic, to a new field in the event results?
What is returned when Splunk finds fewer than the minimum matches for each lookup value?
What is an example of the simple XML syntax for a base search and its post-srooess search?
If a nested macro expands to a search string that begins with a generating command, what additional syntax is needed?
Assuming a standard time zone across the environment, what syntax will always return ewnts from between 2:00am and 5:00am?
Repeating JSON data structures within one event will be extracted as what type of fields?
What order of incoming events must be supplied to the transaction command to ensure correct results?