<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What's the difference between these two searches in Security</title>
    <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264134#M7238</link>
    <description>&lt;P&gt;These are the two queries:&lt;/P&gt;

&lt;P&gt;| &lt;CODE&gt;tstats&lt;/CODE&gt; count from datamodel=Authentication by _time,Authentication.action span=10m | timechart minspan=10m useother=&lt;CODE&gt;useother&lt;/CODE&gt; count by Authentication.action | &lt;CODE&gt;drop_dm_object_name("Authentication")&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;| &lt;CODE&gt;tstats&lt;/CODE&gt; count from datamodel=Web by _time,Web.action span=10m | timechart minspan=10m useother=&lt;CODE&gt;useother&lt;/CODE&gt; count by Web.action | &lt;CODE&gt;drop_dm_object_name("Web")&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;So I can see that the only difference between the two is that where "Authentication" is in the first one, "Web" is in its place in the second one. &lt;/P&gt;

&lt;P&gt;So The first difference is that they are counting from difference datamodels (Web and Authentication). But how is "Authentication.action" different from "Web.action"?&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 11:29:25 GMT</pubDate>
    <dc:creator>Justin1224</dc:creator>
    <dc:date>2020-09-29T11:29:25Z</dc:date>
    <item>
      <title>What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264134#M7238</link>
      <description>&lt;P&gt;These are the two queries:&lt;/P&gt;

&lt;P&gt;| &lt;CODE&gt;tstats&lt;/CODE&gt; count from datamodel=Authentication by _time,Authentication.action span=10m | timechart minspan=10m useother=&lt;CODE&gt;useother&lt;/CODE&gt; count by Authentication.action | &lt;CODE&gt;drop_dm_object_name("Authentication")&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;| &lt;CODE&gt;tstats&lt;/CODE&gt; count from datamodel=Web by _time,Web.action span=10m | timechart minspan=10m useother=&lt;CODE&gt;useother&lt;/CODE&gt; count by Web.action | &lt;CODE&gt;drop_dm_object_name("Web")&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;So I can see that the only difference between the two is that where "Authentication" is in the first one, "Web" is in its place in the second one. &lt;/P&gt;

&lt;P&gt;So The first difference is that they are counting from difference datamodels (Web and Authentication). But how is "Authentication.action" different from "Web.action"?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:29:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264134#M7238</guid>
      <dc:creator>Justin1224</dc:creator>
      <dc:date>2020-09-29T11:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264135#M7239</link>
      <description>&lt;P&gt;Authentication data model is for login and logout activities&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/CIM/4.5.0/User/Authentication"&gt;http://docs.splunk.com/Documentation/CIM/4.5.0/User/Authentication&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Web data model is for web/proxy server data&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/CIM/4.5.0/User/Web"&gt;http://docs.splunk.com/Documentation/CIM/4.5.0/User/Web&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2016 14:47:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264135#M7239</guid>
      <dc:creator>cmerriman</dc:creator>
      <dc:date>2016-10-18T14:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264136#M7240</link>
      <description>&lt;P&gt;Whether Authentication.action and Web.action are same or different depends on the their corresponding data model definition. They are a field in the data model and your queries is generating count for every value of action in 10 min time bucket. What type of values the action field contains in those two data model totally depends on the data  on which the data model was build.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2016 14:48:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264136#M7240</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-10-18T14:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264137#M7241</link>
      <description>&lt;P&gt;Ok, thank you. Also, if it says, Authentication.app, then is it doing the same thing, except now just counting for each unique combination of bucketed time and field app? &lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2016 17:37:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264137#M7241</guid>
      <dc:creator>Justin1224</dc:creator>
      <dc:date>2016-10-18T17:37:26Z</dc:date>
    </item>
    <item>
      <title>Re: What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264138#M7242</link>
      <description>&lt;P&gt;That's correct.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2016 18:23:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264138#M7242</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-10-18T18:23:47Z</dc:date>
    </item>
    <item>
      <title>Re: What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264139#M7243</link>
      <description>&lt;P&gt;Sorry, one last thing. Is this description accurate as to what this search does, disregarding the timechart portion? &lt;/P&gt;

&lt;P&gt;| &lt;CODE&gt;tstats&lt;/CODE&gt; count from datamodel=Authentication where nodename=Authentication.Default_Authentication Authentication.action=success by _time span=1h | timechart minspan=1h count&lt;/P&gt;

&lt;P&gt;Translation:&lt;BR /&gt;
Count the number of times the field "action" equals success from the datamodel named "Authentication" from the node "Default_Authentication". Perform this count for each 1 hour period of time.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2016 22:10:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264139#M7243</guid>
      <dc:creator>Justin1224</dc:creator>
      <dc:date>2016-10-18T22:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264140#M7244</link>
      <description>&lt;P&gt;And also, why is there an Authentication.app after the "Authentication.action=success by _time"? What is that doing? Similarily, what is the timechart portion doing with Authentication.app? Isn't the search already counting when action=success? Is it also counting the number of events where app is not null?&lt;/P&gt;

&lt;P&gt;| &lt;CODE&gt;tstats&lt;/CODE&gt; count from datamodel=Authentication where nodename=Authentication.Default_Authentication Authentication.action=success by _time,Authentication.app span=1h | timechart minspan=1h count by Authentication.app | &lt;CODE&gt;drop_dm_object_name("Authentication")&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:29:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264140#M7244</guid>
      <dc:creator>Justin1224</dc:creator>
      <dc:date>2020-09-29T11:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264141#M7245</link>
      <description>&lt;P&gt;The description looks correct to me.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2016 22:26:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264141#M7245</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-10-18T22:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264142#M7246</link>
      <description>&lt;P&gt;Here the count is done for combination of 1h bucketed _time and values of field Authentication.app. &lt;BR /&gt;
The timechart command does two things here &lt;BR /&gt;
1) The output after tstats will be with fields _time, Authentication.app count. The final output that you want was timechart (fields _time, value1 value2...). So it's converting stats like output to chartable output. (different series for each value of field Authentication.app)&lt;BR /&gt;
2)Ensures that the number of results stays within the visualization limit of Splunk (1000 points). So if you search gave more than 1000 records, it would increase the span to keep the number of rows less than 1000. If you get less than 1000 records, the span will still remain same and you'll get same number of events after timechart.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2016 22:31:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264142#M7246</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-10-18T22:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264143#M7247</link>
      <description>&lt;P&gt;Ok, but what is the action=success doing in that query though? Is the search just doing everything you described but only for events where the value of the field action is success?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2016 13:38:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264143#M7247</guid>
      <dc:creator>Justin1224</dc:creator>
      <dc:date>2016-10-19T13:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264144#M7248</link>
      <description>&lt;P&gt;Yes.. The where clause basically does the filtering of events, so only the events which has that nodename and action=success will be considered for aggregation.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2016 14:21:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264144#M7248</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-10-19T14:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: What's the difference between these two searches</title>
      <link>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264145#M7249</link>
      <description>&lt;P&gt;Ohhhhhhhh, I think you just gave me a breakthrough. So everything after where but before by, is a where clause, so it only performs the search when all of those conditions are met. Ok thank you that helps so much.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2016 15:17:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-s-the-difference-between-these-two-searches/m-p/264145#M7249</guid>
      <dc:creator>Justin1224</dc:creator>
      <dc:date>2016-10-19T15:17:17Z</dc:date>
    </item>
  </channel>
</rss>

