<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search to Identify when a specificy event stops sending logs to Splunk in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Search-to-Identify-when-a-specificy-event-stops-sending-logs-to/m-p/527727#M4045</link>
    <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;This content helped me to understand a little more, and it has to do with what I need. However, in the query that I have, I need to know only a specific list of extensions (about 250) that I need to check daily, when I set up the query below, it brought everyone, even those that are not in my spreadsheet, how can I filter to display the count only of those in my csv?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;My list has 250 events, but Splunk even has extensions that are not the ones I want to filter.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;earliest=-1d index=raw_ramais
| rex field=_raw "EXTENSION:(?&amp;lt;EXTENSION&amp;gt;\+?\d+)"
| stats count by EXTENSION 
| inputlookup append=true ramais.csv
| fillnull count 
| stats sum(count) as count by EXTENSION&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 03 Nov 2020 14:00:26 GMT</pubDate>
    <dc:creator>leandromatperei</dc:creator>
    <dc:date>2020-11-03T14:00:26Z</dc:date>
    <item>
      <title>Search to Identify when a specificy event stops sending logs to Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Search-to-Identify-when-a-specificy-event-stops-sending-logs-to/m-p/527716#M4043</link>
      <description>&lt;P&gt;I have this search string to identify certain events from extensions that stopped sending logs to Splunk, The specific event is below, I saw some examples using hosts, would it be possible instead of hosts, certain fields in the log? In this specific example, the extension appears in the log, but I need to know if it is not within the 07 day period.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial black,avant garde"&gt;index = raw_ramal EXTENSION: 11111111&amp;nbsp;&lt;/FONT&gt;(That number can be changed, there are thousands of it.&lt;BR /&gt;&lt;BR /&gt;The query below shows me the number of events of the extensions, but it does not help me to locate when any of them stopped having registration in the last 07 days.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=raw_ramal "EXTENSION:"
| rex field=_raw "EXTENSION:(?&amp;lt;EXTENSION&amp;gt;\+?\d+)"
| stats count by EXTENSION&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2020 13:37:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Search-to-Identify-when-a-specificy-event-stops-sending-logs-to/m-p/527716#M4043</guid>
      <dc:creator>leandromatperei</dc:creator>
      <dc:date>2020-11-03T13:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: Search to Identify when a specificy event stops sending logs to Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Search-to-Identify-when-a-specificy-event-stops-sending-logs-to/m-p/527719#M4044</link>
      <description>&lt;P&gt;Finding something that is not there is not Splunk's strong suit.&amp;nbsp; See this blog entry for a good write-up on it.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.duanewaddle.com/proving-a-negative/" target="_blank"&gt;https://www.duanewaddle.com/proving-a-negative/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2020 13:39:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Search-to-Identify-when-a-specificy-event-stops-sending-logs-to/m-p/527719#M4044</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-11-03T13:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: Search to Identify when a specificy event stops sending logs to Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Search-to-Identify-when-a-specificy-event-stops-sending-logs-to/m-p/527727#M4045</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;This content helped me to understand a little more, and it has to do with what I need. However, in the query that I have, I need to know only a specific list of extensions (about 250) that I need to check daily, when I set up the query below, it brought everyone, even those that are not in my spreadsheet, how can I filter to display the count only of those in my csv?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;My list has 250 events, but Splunk even has extensions that are not the ones I want to filter.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;earliest=-1d index=raw_ramais
| rex field=_raw "EXTENSION:(?&amp;lt;EXTENSION&amp;gt;\+?\d+)"
| stats count by EXTENSION 
| inputlookup append=true ramais.csv
| fillnull count 
| stats sum(count) as count by EXTENSION&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2020 14:00:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Search-to-Identify-when-a-specificy-event-stops-sending-logs-to/m-p/527727#M4045</guid>
      <dc:creator>leandromatperei</dc:creator>
      <dc:date>2020-11-03T14:00:26Z</dc:date>
    </item>
  </channel>
</rss>

