Item logo image for Splunk Quick Search

Splunk Quick Search

ExtensionTools1 user
Item media 3 (screenshot) for Splunk Quick Search
Item media 1 (screenshot) for Splunk Quick Search
Item media 2 (screenshot) for Splunk Quick Search
Item media 3 (screenshot) for Splunk Quick Search
Item media 1 (screenshot) for Splunk Quick Search
Item media 1 (screenshot) for Splunk Quick Search
Item media 2 (screenshot) for Splunk Quick Search
Item media 3 (screenshot) for Splunk Quick Search

Overview

Perform Splunk searches on highlighted text

Allow users to instantly search selected text in their Splunk instance with a simple right-click. The extension adds a 'Search in Splunk' option to Chrome's context menu, which automatically executes a search in Splunk using the selected text and displays the results in a popup window with intelligent grouping of similar events. Features - Right-click any selected text to search in Splunk - Grouped results view with pattern detection and counts - Token-based authentication for secure access - Customizable search templates and time ranges - Results displayed in a convenient popup window - Built-in debug tools for troubleshooting Configuration - Configure the following settings: - Splunk API URL: Your Splunk API endpoint (e.g., https://splunk.company.com:8089) - Splunk UI URL: Your Splunk web interface URL (e.g., https://splunk.company.com:8000) - Authentication Token: Your Splunk authentication token - Search Template: Search query template (default: index=* $SELECTION$) - Time Range: Time range for searches (default: -24h@h) - Max Results: Maximum number of results to fetch (default: 1000) Getting a Splunk Token - Log into your Splunk instance - Navigate to Settings → Tokens - Click "New Token" - Set appropriate permissions (search capability required) - Copy the token value (without any prefix) Usage - Select any text on a webpage - Right-click the selected text - Choose "Search in Splunk: 'your selected text'" - View results in the popup window Results View Features - Grouped Results: Similar log entries are grouped with occurrence counts - Pattern Detection: Automatically identifies and groups similar messages - Expandable Details: Click on any group to see individual instances - Search Highlighting: Your search terms are highlighted in yellow - Quick Stats: View total results and unique patterns at a glance - Open in Splunk: Click to open the full search in Splunk UI Example Workflow - Select Text: Highlight a URL, error message, or any text you want to search - Right-Click: Open the context menu - Search: Click "Search in Splunk: 'https://mobile.events.data.microsoft.com'" - View Results: See grouped results with pattern counts Troubleshooting & Common Issues "Authentication failed" error -Verify your token is correct - Ensure token has search permissions - Check if token has expired - "Network error" or SSL certificate issues - Self-signed certificates is not supported - Verify the API URL is accessible from your network - Check your search template syntax - Verify the time range includes relevant data - Ensure your token has access to the searched indexes Debug Tools - Click "Troubleshooting & Debug" in the extension popup - Use the debug page to: - Test your Splunk connection - View stored configuration - Check for errors in the console

Details

  • Version
    1.1
  • Updated
    June 12, 2025
  • Size
    34.05KiB
  • Languages
    English
  • Developer
    Email
    alexandre@argeris.net
  • Non-trader
    This developer has not identified itself as a trader. For consumers in the European Union, please note that consumer rights do not apply to contracts between you and this developer.

Privacy

The developer has disclosed that it will not collect or use your data.

This developer declares that your data is

  • Not being sold to third parties, outside of the approved use cases
  • Not being used or transferred for purposes that are unrelated to the item's core functionality
  • Not being used or transferred to determine creditworthiness or for lending purposes
Google apps