<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Summary indexing in Knowledge Management</title>
    <link>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186641#M1691</link>
    <description>&lt;P&gt;Please show the search that you are using to create entries in the summary index... thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 03 Jun 2014 20:47:09 GMT</pubDate>
    <dc:creator>lguinn2</dc:creator>
    <dc:date>2014-06-03T20:47:09Z</dc:date>
    <item>
      <title>Summary indexing</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186638#M1688</link>
      <description>&lt;P&gt;Hi &lt;/P&gt;

&lt;P&gt;According to this page&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.3/Knowledge/Usesummaryindexing" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/6.0.3/Knowledge/Usesummaryindexing&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;stuff that is sent to a summary index has its fields renamed, the sourcetyp gets renamed to stash and the orig. sourcetype should be called orig_sourcetype.&lt;BR /&gt;
Using version 6.0.3 I get the sourcetype field renamed for stuff sent to the summary index but there is no orig_sourcetype field. &lt;/P&gt;

&lt;P&gt;Are there any special requisites to get those fields ? Anything I need to do or are not allowed to do ?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:46:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186638#M1688</guid>
      <dc:creator>flo_cognosec</dc:creator>
      <dc:date>2020-09-28T16:46:55Z</dc:date>
    </item>
    <item>
      <title>Re: Summary indexing</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186639#M1689</link>
      <description>&lt;P&gt;Does your query, result of which you're saving/sending to summary index, generates field sourcetype? During summary indexing following fields are being overwritten and if these fields are present in the summary index query result, they will get renamed to orig_fieldname.&lt;/P&gt;

&lt;P&gt;host&lt;BR /&gt;&lt;BR /&gt;
source&lt;BR /&gt;
sourcetype&lt;BR /&gt;
index&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2014 13:46:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186639#M1689</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2014-06-03T13:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: Summary indexing</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186640#M1690</link>
      <description>&lt;P&gt;I expected the sourcetype field that splunk automatically generates for every event to be renamed to orig_sourcetype acc. to the mentioned webpage but that does not happen.&lt;/P&gt;

&lt;P&gt;My query indeed DOES generate some fields but with unsed names and they are dumped alltogether anyway and are therefor NOT in the summary index &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2014 13:53:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186640#M1690</guid>
      <dc:creator>flo_cognosec</dc:creator>
      <dc:date>2014-06-03T13:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: Summary indexing</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186641#M1691</link>
      <description>&lt;P&gt;Please show the search that you are using to create entries in the summary index... thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2014 20:47:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186641#M1691</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2014-06-03T20:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: Summary indexing</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186642#M1692</link>
      <description>&lt;P&gt;The search itself works and provides the fields that I want / need but saving the results to a summary index will neither get me the name / new_name fields nor the orig_sourcetype field that I think should be automatically created.&lt;/P&gt;

&lt;P&gt;index=some_index sourcetype=auditd | sort msg desc | transaction name maxspan=2s startswith=(syscall=open AND a1=c1) endswith=(syscall=unlink) keeporphans=true | where isnull(eventcount) | eval name=if(isnull(orig_name),name,orig_name) | eval new_name=if(isnull(new_name),"",new_name)&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:47:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186642#M1692</guid>
      <dc:creator>flo_cognosec</dc:creator>
      <dc:date>2020-09-28T16:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: Summary indexing</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186643#M1693</link>
      <description>&lt;P&gt;The sourcetype of a summary event will always be "stash_new".&lt;BR /&gt;
And a field "orig_sourcetype" will be created &lt;STRONG&gt;only if such a field is necessary&lt;/STRONG&gt; in your summary generation search.&lt;/P&gt;

&lt;P&gt;example :&lt;BR /&gt;
&lt;CODE&gt;&amp;lt;mysearch&amp;gt; | sistats count by sourcetype&lt;/CODE&gt;&lt;BR /&gt;
will silently replace sourcetype by "orig_sourcetype" and revert it back when you retrieve the summarized result with the symmetrical search&lt;BR /&gt;
&lt;CODE&gt;index=summary search_name=mysummarysearch | stats count by sourcetype&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;However a summary populating search like&lt;BR /&gt;
&lt;CODE&gt;&amp;lt;mysearch&amp;gt; | sistats count by host&lt;/CODE&gt;&lt;BR /&gt;
will not create the field "orig_summary" because there is no need for it in the summarization.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:58:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186643#M1693</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2020-09-28T16:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: Summary indexing</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186644#M1694</link>
      <description>&lt;P&gt;Why doesn't splunk keep / rename the fields created by the eval statements ? Those are the fields that I would need as fields in the summary automatically ..&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 07:27:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186644#M1694</guid>
      <dc:creator>flo_cognosec</dc:creator>
      <dc:date>2014-07-01T07:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: Summary indexing</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186645#M1695</link>
      <description>&lt;P&gt;"fields created by the eval statements", it depends if the fields are renamed BEFORE or AFTER the summary command.&lt;/P&gt;

&lt;P&gt;example :&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;index=* | rename host AS myhost | sistats count by myhost&lt;/CODE&gt; will be summarized with the field myhost&lt;/P&gt;

&lt;P&gt;while&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;index=*  | sistats count by host | rename host AS myhost&lt;/CODE&gt; will be summarized at the "sistats" level, therefore any renaming will not be saved, and the field will be "host"&lt;/P&gt;

&lt;P&gt;this is the same for renamed commands in the summary command.&lt;BR /&gt;
&lt;CODE&gt;index=*  | sistats count AS mycount by host&lt;/CODE&gt; the renaming of the count field will not be saved either.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 16:31:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186645#M1695</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2014-07-01T16:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: Summary indexing</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186646#M1696</link>
      <description>&lt;P&gt;the sourcetype is the only exception....&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 16:32:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186646#M1696</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2014-07-01T16:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: Summary indexing</title>
      <link>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186647#M1697</link>
      <description>&lt;P&gt;What I've learned with summary indexing and transactions is there are some inconsistencies in the collection of the data ... It turned out I have to do the transaction in the summary index, not before because my main concern with the duration ... I am collecting VPN logs. so I ended up using a join command to gather my events, used collect to push them into the summary index and then I run the transaction command using the startswith/endswith and eval on the fields.. that solved a big part of my problem. &lt;/P&gt;

&lt;P&gt;| join session_id [ search agency=sales] .... this gathers all my relevant events with a session_id field and narrows the grouping down by doing a search for the field agency=sales&lt;/P&gt;

&lt;P&gt;I also found out that I had to create all new field extractions using the sourcetype=stash because that is what the summary index uses ... other summary indexes will also use the same sourcetype=stash too, although I think you can force a different name ... luckily I didn't need to figure that out. &lt;/P&gt;

&lt;P&gt;Maybe this is useful, maybe not ... but thought I would try ... Oh, and remember to make sure your in smartmode instead of fast mode for field discovery&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:51:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Knowledge-Management/Summary-indexing/m-p/186647#M1697</guid>
      <dc:creator>rewritex</dc:creator>
      <dc:date>2020-09-29T09:51:47Z</dc:date>
    </item>
  </channel>
</rss>

