<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help converting raw text into a simple stats table showing hostname and destination in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Help-converting-raw-text-into-a-simple-stats-table-showing/m-p/288505#M34347</link>
    <description>&lt;P&gt;Note that the search (before the first "|")  resolves to &lt;CODE&gt;index=infrastructure 10 AND 120 AND 213 AND 29&lt;/CODE&gt;, because the '.' is a minor segmenter, so it breaks up the IP address into four individual terms. Hence, it may not retrieve exactly what you need. (You can see the search being executed in the search.log, found in the Job Inspector, if you search for "Lispy")&lt;BR /&gt;
Example:&lt;BR /&gt;
    08-24-2017 01:18:18.579 INFO  UnifiedSearch - Expanded index search = ( index=infrastructure 10.120.213.29 )&lt;BR /&gt;
    08-24-2017 01:18:18.580 INFO  UnifiedSearch - base lispy: &lt;STRONG&gt;[ AND 10 120 213 29 index::infrastructure ]&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Docs for how to handle it &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.3/Search/UseCASEandTERMtomatchphrases"&gt;here&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Aug 2017 08:23:20 GMT</pubDate>
    <dc:creator>s2_splunk</dc:creator>
    <dc:date>2017-08-24T08:23:20Z</dc:date>
    <item>
      <title>Help converting raw text into a simple stats table showing hostname and destination</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Help-converting-raw-text-into-a-simple-stats-table-showing/m-p/288503#M34345</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;

&lt;P&gt;Thanks for reading.  I've tried a bunch of the offerings in the &amp;gt;answers forum with no luck. Here's my effort:&lt;/P&gt;

&lt;P&gt;Need the following raw text to convert into a simple stats table showing hostname and destination.&lt;/P&gt;

&lt;P&gt;Raw text:&lt;BR /&gt;
    8/23/17&lt;BR /&gt;
6:29:10.000 PM&lt;BR /&gt;&lt;BR /&gt;
Aug 23 18:29:10 asbcnspap02.gab.com 08/23/2017:18:29:10  asbcnspap02 0-PPE-1 : default TCP CONN_TERMINATE 23913664 0 :  Source 10.XXX.XXX.29:443 - Destination 10.120.209.12:4911 - Start Time 08/24/2017:01:28:25 GMT - End Time 08/24/2017:01:29:10 GMT - Total_bytes_send 1 - Total_bytes_recv 1 &lt;/P&gt;

&lt;P&gt;Current search (not resolving):&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=infrastructure 10.120.213.29 | stats count by Source, Destination | lookup dnslookup clienthost OUTPUT clientip 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Any help MUCH appreciated!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:25:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Help-converting-raw-text-into-a-simple-stats-table-showing/m-p/288503#M34345</guid>
      <dc:creator>gabarrygowin</dc:creator>
      <dc:date>2020-09-29T15:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: Help converting raw text into a simple stats table showing hostname and destination</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Help-converting-raw-text-into-a-simple-stats-table-showing/m-p/288504#M34346</link>
      <description>&lt;P&gt;Try like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=infrastructure 10.120.213.29 | stats count by Source, Destination | lookup dnslookup clientip as Source OUTPUT clienthost as Source_Host   | lookup dnslookup clientip as Destination OUTPUT clienthost as Destination_Host 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 24 Aug 2017 04:19:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Help-converting-raw-text-into-a-simple-stats-table-showing/m-p/288504#M34346</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-08-24T04:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: Help converting raw text into a simple stats table showing hostname and destination</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Help-converting-raw-text-into-a-simple-stats-table-showing/m-p/288505#M34347</link>
      <description>&lt;P&gt;Note that the search (before the first "|")  resolves to &lt;CODE&gt;index=infrastructure 10 AND 120 AND 213 AND 29&lt;/CODE&gt;, because the '.' is a minor segmenter, so it breaks up the IP address into four individual terms. Hence, it may not retrieve exactly what you need. (You can see the search being executed in the search.log, found in the Job Inspector, if you search for "Lispy")&lt;BR /&gt;
Example:&lt;BR /&gt;
    08-24-2017 01:18:18.579 INFO  UnifiedSearch - Expanded index search = ( index=infrastructure 10.120.213.29 )&lt;BR /&gt;
    08-24-2017 01:18:18.580 INFO  UnifiedSearch - base lispy: &lt;STRONG&gt;[ AND 10 120 213 29 index::infrastructure ]&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Docs for how to handle it &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.3/Search/UseCASEandTERMtomatchphrases"&gt;here&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 08:23:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Help-converting-raw-text-into-a-simple-stats-table-showing/m-p/288505#M34347</guid>
      <dc:creator>s2_splunk</dc:creator>
      <dc:date>2017-08-24T08:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: Help converting raw text into a simple stats table showing hostname and destination</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Help-converting-raw-text-into-a-simple-stats-table-showing/m-p/288506#M34348</link>
      <description>&lt;P&gt;Thanks much sslevert!&lt;/P&gt;

&lt;P&gt;I finally got that all figured out and appreciate the leading help.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 15:59:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Help-converting-raw-text-into-a-simple-stats-table-showing/m-p/288506#M34348</guid>
      <dc:creator>gabarrygowin</dc:creator>
      <dc:date>2017-08-24T15:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: Help converting raw text into a simple stats table showing hostname and destination</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Help-converting-raw-text-into-a-simple-stats-table-showing/m-p/288507#M34349</link>
      <description>&lt;P&gt;Cool. Please accept somesoni2's answer to mark it as resolved for posterity.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 17:29:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Help-converting-raw-text-into-a-simple-stats-table-showing/m-p/288507#M34349</guid>
      <dc:creator>s2_splunk</dc:creator>
      <dc:date>2017-08-24T17:29:07Z</dc:date>
    </item>
  </channel>
</rss>

