Using event types to categorize results
An event type is essentially a simple search definition, with no pipes or commands.
To define an event type, first make a search. Let's search for the following:
sourcetype="impl_splunk_gen_SomeMoreLogs" logger=AuthClass
Let's say these events are login events. To make an event type, choose Settings
and then Event types
, as shown in the following screenshot:
![](https://static.packt-cdn.com/products/9781788836289/graphics/8e4590ae-932a-4aaa-bb10-c2292be25393.png)
This presents us with the Event types
page, where we view existing event types and, as we want to do here, create a new event:
![](https://static.packt-cdn.com/products/9781788836289/graphics/cb695586-db95-4698-b165-85a7fe6821f8.png)
First, click the button labeled New
. Splunk will display the Add New
page:
![](https://static.packt-cdn.com/products/9781788836289/graphics/497103d2-295b-4e8d-a31a-074f34dce0fe.png)
Let's name our event type login
.
We can now search for the same events using the event type:
eventtype=login
Event types can be used as part of another search, as follows:
eventtype=login loglevel=error
Event type definitions can also refer to other event types. For example, let's assume that all login events that have a loglevel
value of error
are in fact failed logins. We can now save this into another...