<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Add daily stats to Search in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667649#M17815</link>
    <description>&lt;P&gt;My bad. I forgot to add a time variable to the eventstats. By disregarding time the query checks whether a user has more than 10 failed logins over the entire search span. If your data already has a date stamp then you can use that. Alternatively you could adjust the query like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=gbts-vconnection sourcetype=VMWareVDM_debug "onEvent: DISCONNECTED" (host=Host1 OR host=host2)
| rex field=_raw "(?ms)^(?:[^:\\n]*:){5}(?P&amp;lt;IONS&amp;gt;[^;]+)(?:[^:\\n]*:){8}(?P&amp;lt;Device&amp;gt;[^;]+)(?:[^;\\n]*;){4}\\w+:(?P&amp;lt;VDI&amp;gt;\\w+)" offset_field=_extracted_fields_bounds
| eval temp_date = strftime(_time, "%Y-%m-%d")
| eventstats count as failed_count by IONS,temp_date
| where failed_count&amp;gt;=10
| timechart dc(IONS) as IONS span=1d&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Nov 2023 08:08:56 GMT</pubDate>
    <dc:creator>FelixLeh</dc:creator>
    <dc:date>2023-11-07T08:08:56Z</dc:date>
    <item>
      <title>Add daily stats to Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667319#M17801</link>
      <description>&lt;P&gt;I was able to find this search that gives me the number of users(IONS) who disconnected 10 or more times however it gives me the total based on time.&amp;nbsp; I would like to display a daily number for 30 days in a line chart.&amp;nbsp; For example Monday there were 10 users who disconnected over 10 time and so on for the rest of week. I can't seem to get the timechart to work with this:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=gbts-vconnection sourcetype=VMWareVDM_debug "onEvent: DISCONNECTED" (host=Host1 OR host=host2)
| rex field=_raw "(?ms)^(?:[^:\\n]*:){5}(?P&amp;lt;IONS&amp;gt;[^;]+)(?:[^:\\n]*:){8}(?P&amp;lt;Device&amp;gt;[^;]+)(?:[^;\\n]*;){4}\\w+:(?P&amp;lt;VDI&amp;gt;\\w+)" offset_field=_extracted_fields_bounds
| stats count by Device IONS
| where count &amp;gt;= 10
| appendpipe [|stats count as IONS | eval Device="Total"]&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 03 Nov 2023 14:09:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667319#M17801</guid>
      <dc:creator>Madmax</dc:creator>
      <dc:date>2023-11-03T14:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: Add daily stats to Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667328#M17802</link>
      <description>&lt;P&gt;If I understand you correctly the query should work like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=gbts-vconnection sourcetype=VMWareVDM_debug "onEvent: DISCONNECTED" (host=Host1 OR host=host2)
| rex field=_raw "(?ms)^(?:[^:\\n]*:){5}(?P&amp;lt;IONS&amp;gt;[^;]+)(?:[^:\\n]*:){8}(?P&amp;lt;Device&amp;gt;[^;]+)(?:[^;\\n]*;){4}\\w+:(?P&amp;lt;VDI&amp;gt;\\w+)" offset_field=_extracted_fields_bounds
| eventstats count as failed_count by Device IONS
| where failed_count&amp;gt;=10
| timechart dc(IONS) as IONS span=1d&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This will show you the amount of user with more than 10 failed logons on each day.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2023 14:47:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667328#M17802</guid>
      <dc:creator>FelixLeh</dc:creator>
      <dc:date>2023-11-03T14:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Add daily stats to Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667348#M17803</link>
      <description>&lt;P&gt;That's exactly what I needed!!!&amp;nbsp; Thank you very much.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2023 17:41:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667348#M17803</guid>
      <dc:creator>Madmax</dc:creator>
      <dc:date>2023-11-03T17:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: Add daily stats to Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667465#M17806</link>
      <description>&lt;P&gt;I'm glad I was able to help!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Nov 2023 08:28:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667465#M17806</guid>
      <dc:creator>FelixLeh</dc:creator>
      <dc:date>2023-11-06T08:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: Add daily stats to Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667578#M17809</link>
      <description>&lt;P&gt;I spoke too soon.&amp;nbsp; It appears that the numbers are not accurate.&amp;nbsp; It shows the proper number if I set the time picker to last 24 hours but once I select last 30 days the number for yesterday increase by hundreds.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Nov 2023 16:29:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667578#M17809</guid>
      <dc:creator>Madmax</dc:creator>
      <dc:date>2023-11-06T16:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: Add daily stats to Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667649#M17815</link>
      <description>&lt;P&gt;My bad. I forgot to add a time variable to the eventstats. By disregarding time the query checks whether a user has more than 10 failed logins over the entire search span. If your data already has a date stamp then you can use that. Alternatively you could adjust the query like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=gbts-vconnection sourcetype=VMWareVDM_debug "onEvent: DISCONNECTED" (host=Host1 OR host=host2)
| rex field=_raw "(?ms)^(?:[^:\\n]*:){5}(?P&amp;lt;IONS&amp;gt;[^;]+)(?:[^:\\n]*:){8}(?P&amp;lt;Device&amp;gt;[^;]+)(?:[^;\\n]*;){4}\\w+:(?P&amp;lt;VDI&amp;gt;\\w+)" offset_field=_extracted_fields_bounds
| eval temp_date = strftime(_time, "%Y-%m-%d")
| eventstats count as failed_count by IONS,temp_date
| where failed_count&amp;gt;=10
| timechart dc(IONS) as IONS span=1d&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 08:08:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667649#M17815</guid>
      <dc:creator>FelixLeh</dc:creator>
      <dc:date>2023-11-07T08:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: Add daily stats to Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667691#M17818</link>
      <description>&lt;P&gt;That worked like a charm!!&amp;nbsp; Thanks again!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 14:18:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Add-daily-stats-to-Search/m-p/667691#M17818</guid>
      <dc:creator>Madmax</dc:creator>
      <dc:date>2023-11-07T14:18:02Z</dc:date>
    </item>
  </channel>
</rss>

