<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to filter down events with specific string value from a multivalue field and then to compare and pick values as per the condition? in Installation</title>
    <link>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411312#M5524</link>
    <description>&lt;P&gt;Hi Vatsal, thanks for responding.&lt;BR /&gt;
Here's the query that's written till now. This will fetch all the Installation success and failure events and going to give the latest result. There could be multiple updates and some might have failed and other updates that came through would have got installed fine. So, this query is only going to give me the latest log where its failure. I need to get all the installation failure logs with the respective updates. &lt;BR /&gt;
Not sure if this is this clear enough?&lt;/P&gt;

&lt;P&gt;index=sccm_uk source="C:\Windows\CCM\Logs\WUAHandler.log" sourcetype=WindowsCCMLogs host="&lt;EM&gt;"  (ADSite_Membership="Installation job encountered some failures&lt;/EM&gt;") OR &lt;BR /&gt;
                  (ADSite_Membership="Installation of updates completed.")&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;              |stats latest(ADSite_Membership) as WUAInstallError by host
              |search WUAInstallError!="Installation of updates completed."                 
              |dedup host
              |stats dc(host) as #Hosts by WUAInstallError
              |sort 0 - #Hosts
              |addcoltotals #Hosts
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Wed, 30 Sep 2020 00:50:42 GMT</pubDate>
    <dc:creator>sureshmurgan</dc:creator>
    <dc:date>2020-09-30T00:50:42Z</dc:date>
    <item>
      <title>How to filter down events with specific string value from a multivalue field and then to compare and pick values as per the condition?</title>
      <link>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411310#M5522</link>
      <description>&lt;P&gt;Windows update installation logs from machines are forwarded every day in Splunk.&lt;BR /&gt;In our windows environment, some windows update installations might fail and get logged as failed in the log, many get installed and gets logged as installed. These failed updates will try again to install another time and may get installed successfully or may end up as a failure again.&lt;/P&gt;
&lt;P&gt;Requirement: Take all the values from the installation logs (ie., all the values in a field) filter out the failed installation which hasn't been able to get installed successfully yet.&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jun 2020 15:49:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411310#M5522</guid>
      <dc:creator>sureshmurgan</dc:creator>
      <dc:date>2020-06-06T15:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter down events with specific string value from a multivalue field and then to compare and pick values as per the condition?</title>
      <link>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411311#M5523</link>
      <description>&lt;P&gt;@sureshmurgan - Could you please share _raw event sample and query that till now you have wrote if any?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 09:59:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411311#M5523</guid>
      <dc:creator>VatsalJagani</dc:creator>
      <dc:date>2019-06-10T09:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter down events with specific string value from a multivalue field and then to compare and pick values as per the condition?</title>
      <link>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411312#M5524</link>
      <description>&lt;P&gt;Hi Vatsal, thanks for responding.&lt;BR /&gt;
Here's the query that's written till now. This will fetch all the Installation success and failure events and going to give the latest result. There could be multiple updates and some might have failed and other updates that came through would have got installed fine. So, this query is only going to give me the latest log where its failure. I need to get all the installation failure logs with the respective updates. &lt;BR /&gt;
Not sure if this is this clear enough?&lt;/P&gt;

&lt;P&gt;index=sccm_uk source="C:\Windows\CCM\Logs\WUAHandler.log" sourcetype=WindowsCCMLogs host="&lt;EM&gt;"  (ADSite_Membership="Installation job encountered some failures&lt;/EM&gt;") OR &lt;BR /&gt;
                  (ADSite_Membership="Installation of updates completed.")&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;              |stats latest(ADSite_Membership) as WUAInstallError by host
              |search WUAInstallError!="Installation of updates completed."                 
              |dedup host
              |stats dc(host) as #Hosts by WUAInstallError
              |sort 0 - #Hosts
              |addcoltotals #Hosts
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:50:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411312#M5524</guid>
      <dc:creator>sureshmurgan</dc:creator>
      <dc:date>2020-09-30T00:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter down events with specific string value from a multivalue field and then to compare and pick values as per the condition?</title>
      <link>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411313#M5525</link>
      <description>&lt;P&gt;Here's the query that's written till now. This will fetch all the Installation success and failure events and going to give the latest result. There could be multiple updates and some might have failed and other updates that came through would have got installed fine. So, this query is only going to give me the latest log where its failure. I need to get all the installation failure logs with the respective updates. &lt;BR /&gt;
Not sure if this is this clear enough?&lt;/P&gt;

&lt;P&gt;index=sccm_uk source="C:\Windows\CCM\Logs\WUAHandler.log" sourcetype=WindowsCCMLogs host="*" (ADSite_Membership="Installation job encountered some failures") OR &lt;BR /&gt;
(ADSite_Membership="Installation of updates completed.")&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;           |stats latest(ADSite_Membership) as WUAInstallError by host
           |search WUAInstallError!="Installation of updates completed."                 
           |dedup host
           |stats dc(host) as #Hosts by WUAInstallError
           |sort 0 - #Hosts
           |addcoltotals #Hosts
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:50:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411313#M5525</guid>
      <dc:creator>sureshmurgan</dc:creator>
      <dc:date>2020-09-30T00:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter down events with specific string value from a multivalue field and then to compare and pick values as per the condition?</title>
      <link>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411314#M5526</link>
      <description>&lt;P&gt;Could you please try:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=sccm_uk source="C:\\Windows\\CCM\\Logs\\WUAHandler.log" sourcetype=WindowsCCMLogs host="" (ADSite_Membership="Installation job encountered some failures") OR 
(ADSite_Membership="Installation of updates completed.")
|stats list(ADSite_Membership) as WUAInstall by host
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Could you please check value of WUAInstall? Is this what you want? It must be showing all logs(ADSite_Membership) of installation.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 12:09:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411314#M5526</guid>
      <dc:creator>VatsalJagani</dc:creator>
      <dc:date>2019-06-11T12:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter down events with specific string value from a multivalue field and then to compare and pick values as per the condition?</title>
      <link>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411315#M5527</link>
      <description>&lt;P&gt;I got the solution. I am using windows events to keep a track of the installation failure and got a query working for it. Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2019 11:35:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411315#M5527</guid>
      <dc:creator>sureshmurgan</dc:creator>
      <dc:date>2019-06-20T11:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter down events with specific string value from a multivalue field and then to compare and pick values as per the condition?</title>
      <link>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411316#M5528</link>
      <description>&lt;P&gt;If you can, please share your solution as an answer here and accept it.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2019 16:05:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411316#M5528</guid>
      <dc:creator>VatsalJagani</dc:creator>
      <dc:date>2019-06-20T16:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter down events with specific string value from a multivalue field and then to compare and pick values as per the condition?</title>
      <link>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411317#M5529</link>
      <description>&lt;P&gt;index=windowsevents sourcetype="System" SourceName=WindowsUpdate&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;              EventCode=19 OR EventCode=20

              |rex field=Message "(?P&amp;lt;Status&amp;gt;Installation\s\w+):.*(?P&amp;lt;Update&amp;gt;KB\d+).*"


              |stats latest(_time) as Time latest(Status) as Status latest(Message) as Message by host Update
              |search Status="Installation Failure"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 07 Oct 2019 18:21:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411317#M5529</guid>
      <dc:creator>sureshmurgan</dc:creator>
      <dc:date>2019-10-07T18:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter down events with specific string value from a multivalue field and then to compare and pick values as per the condition?</title>
      <link>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411318#M5530</link>
      <description>&lt;P&gt;This gives me the intended result. Thanks VatsalJagani for your help with this.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 18:22:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411318#M5530</guid>
      <dc:creator>sureshmurgan</dc:creator>
      <dc:date>2019-10-07T18:22:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter down events with specific string value from a multivalue field and then to compare and pick values as per the condition?</title>
      <link>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411319#M5531</link>
      <description>&lt;P&gt;index=windowsevents sourcetype="System" SourceName=WindowsUpdate&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;           EventCode=19 OR EventCode=20

           |rex field=Message "(?P&amp;lt;Status&amp;gt;Installation\s\w+):.*(?P&amp;lt;Update&amp;gt;KB\d+).*"


           |stats latest(_time) as Time latest(Status) as Status latest(Message) as Message by host Update
           |search Status="Installation Failure"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 07 Oct 2019 18:22:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/How-to-filter-down-events-with-specific-string-value-from-a/m-p/411319#M5531</guid>
      <dc:creator>sureshmurgan</dc:creator>
      <dc:date>2019-10-07T18:22:52Z</dc:date>
    </item>
  </channel>
</rss>

