<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to deal with value ranges? in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106618#M3982</link>
    <description>&lt;PRE&gt;&lt;CODE&gt;... | eval type = case(from &amp;gt; 1000 AND to &amp;lt; 5000,"aaa",from &amp;gt; 10000 AND to &amp;lt; 20000,"aaa", from &amp;gt; 20001 AND to &amp;lt; 40000,"BBB", 1=1,"Other")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;For the second part of your question that's what I'd lean toward at any rate. The 1=1 is so that if there are values that fall outside of your ranges that evaluates as true and you can see or alert yourself if "Other" shows up.&lt;/P&gt;</description>
    <pubDate>Wed, 13 Nov 2013 12:34:54 GMT</pubDate>
    <dc:creator>Runals</dc:creator>
    <dc:date>2013-11-13T12:34:54Z</dc:date>
    <item>
      <title>How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106608#M3972</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;

&lt;P&gt;have two simple questions about dealing with value ranges:&lt;/P&gt;

&lt;P&gt;1) how to put ranges together?&lt;/P&gt;

&lt;P&gt;I have log informations with ranges, e.g.:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;from="1001" to="2000" type="aaa"
from="2001" to="4000" type="aaa"
from="4001" to="5000" type="aaa"
from="10000" to="20000" type="aaa"
from="20001" to="40000" type="BBB"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I would like to compress it to get something like that:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;from="1001" to="5000" type="aaa"
from="10000" to="20000" type="aaa"
from="20001" to="40000" type="BBB"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;that means, the first three events should be merged, because the range ist continous and they are of the same type. The forth is an nother range and 5th is another type.&lt;/P&gt;

&lt;P&gt;Is there any simple way to go to get it solved? &lt;/P&gt;

&lt;P&gt;2) based on the ranges mentioned above (in the events), is there any simple way, if I have a value, e.g. "1565" to identify what type is it?&lt;/P&gt;

&lt;P&gt;Ragards,&lt;BR /&gt;
Peter&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2013 18:46:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106608#M3972</guid>
      <dc:creator>petersob</dc:creator>
      <dc:date>2013-10-18T18:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106609#M3973</link>
      <description>&lt;P&gt;It's a little bit unclear. Are these actual events? Then merging them would... I don't know. This seems better suited for a &lt;CODE&gt;lookup&lt;/CODE&gt; function..or a &lt;CODE&gt;case&lt;/CODE&gt; function in the search query or... or a rangemap... but all of those are specified outside the context of the event contents. A little background (and some full events) would be beneficial.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2013 19:26:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106609#M3973</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-10-18T19:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106610#M3974</link>
      <description>&lt;P&gt;yes, they would be one line per event.&lt;BR /&gt;
In fact I just want to create the log messages, what I have are just ranges of serial numbers (first and last, ok i wrote "from" and "to"). Only one range per event will be generated, because they occure at different time. Then, in later time (perhaps dayily or weekly) I have to evaluate the data as described: merging ranges together and making a report containing the used ranges of numbers. &lt;BR /&gt;
I decided to use key="value" pairs for the fields because Splunk recognize them automatically without further field definitions.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2013 19:49:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106610#M3974</guid>
      <dc:creator>petersob</dc:creator>
      <dc:date>2013-10-18T19:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106611#M3975</link>
      <description>&lt;P&gt;...and the second point was, to use that range log events to find the right item type.&lt;BR /&gt;
In fact it's not "type" but an identifier (don't care about the name), which I will use then for further search. That means, if something happens to the number "1565" I will like to make a simple search (maybe using a form input) and get the item type.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2013 19:49:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106611#M3975</guid>
      <dc:creator>petersob</dc:creator>
      <dc:date>2013-10-18T19:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106612#M3976</link>
      <description>&lt;P&gt;if i do something like that: "... | stats min(from) as first, max(to) as last by type" I will miss, that there is a gap between 5000 and 10000.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2013 20:15:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106612#M3976</guid>
      <dc:creator>petersob</dc:creator>
      <dc:date>2013-10-18T20:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106613#M3977</link>
      <description>&lt;P&gt;sorry, but I still don't get it. In my mind, the &lt;EM&gt;events&lt;/EM&gt; that you create in your log would contain number=1234, and then you could search with a &lt;CODE&gt;case&lt;/CODE&gt; or &lt;CODE&gt;rangemap&lt;/CODE&gt; function. Or actually use the &lt;CODE&gt;type&lt;/CODE&gt; information already in the events....&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2013 20:15:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106613#M3977</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-10-18T20:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106614#M3978</link>
      <description>&lt;P&gt;Do you want to - for a given timeframe - find what the actual ranges were.... hmm.. perhaps...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | stats min(from) as Low max(to) as High by type | ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;is what you are looking for?&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2013 20:18:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106614#M3978</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-10-18T20:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106615#M3979</link>
      <description>&lt;P&gt;something like that, but this one doesn't care about the gap between 5000 and 10000.&lt;BR /&gt;
There maybe a multiple gaps between the min and max, and I need to know all the gaps.&lt;BR /&gt;
Thats the problem.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2013 20:25:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106615#M3979</guid>
      <dc:creator>petersob</dc:creator>
      <dc:date>2013-10-18T20:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106616#M3980</link>
      <description>&lt;P&gt;Will these range values will always be in ascending order?&lt;/P&gt;</description>
      <pubDate>Sat, 19 Oct 2013 14:18:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106616#M3980</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2013-10-19T14:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106617#M3981</link>
      <description>&lt;P&gt;now I solved that by writing a custom search command.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Oct 2013 16:26:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106617#M3981</guid>
      <dc:creator>petersob</dc:creator>
      <dc:date>2013-10-20T16:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106618#M3982</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;... | eval type = case(from &amp;gt; 1000 AND to &amp;lt; 5000,"aaa",from &amp;gt; 10000 AND to &amp;lt; 20000,"aaa", from &amp;gt; 20001 AND to &amp;lt; 40000,"BBB", 1=1,"Other")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;For the second part of your question that's what I'd lean toward at any rate. The 1=1 is so that if there are values that fall outside of your ranges that evaluates as true and you can see or alert yourself if "Other" shows up.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2013 12:34:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106618#M3982</guid>
      <dc:creator>Runals</dc:creator>
      <dc:date>2013-11-13T12:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with value ranges?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106619#M3983</link>
      <description>&lt;P&gt;This doesn't provide any useful information at all. More details are needed.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2019 09:53:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/How-to-deal-with-value-ranges/m-p/106619#M3983</guid>
      <dc:creator>zomis</dc:creator>
      <dc:date>2019-11-13T09:53:13Z</dc:date>
    </item>
  </channel>
</rss>

