<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Filter Data in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/Filter-Data/m-p/543700#M37280</link>
    <description>&lt;P&gt;I have a large list of data.&amp;nbsp; I want to only see lines that include certain words.&amp;nbsp; ie would be: Restart.&amp;nbsp; I want to see all mins that are spent to restart a product.&amp;nbsp; I want to create categories for certain words sum the the mins and have it in a pie chart.&amp;nbsp; So the line item may say...restarted&amp;gt;RESTARTED&amp;gt;re started&amp;gt; etc.&amp;nbsp; I want to captured the information in one section of the pie.&amp;nbsp; I can do a google hangout if anyone would like to work with me on this.&lt;/P&gt;</description>
    <pubDate>Sat, 13 Mar 2021 22:37:07 GMT</pubDate>
    <dc:creator>pglover12</dc:creator>
    <dc:date>2021-03-13T22:37:07Z</dc:date>
    <item>
      <title>Filter Data</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Filter-Data/m-p/543700#M37280</link>
      <description>&lt;P&gt;I have a large list of data.&amp;nbsp; I want to only see lines that include certain words.&amp;nbsp; ie would be: Restart.&amp;nbsp; I want to see all mins that are spent to restart a product.&amp;nbsp; I want to create categories for certain words sum the the mins and have it in a pie chart.&amp;nbsp; So the line item may say...restarted&amp;gt;RESTARTED&amp;gt;re started&amp;gt; etc.&amp;nbsp; I want to captured the information in one section of the pie.&amp;nbsp; I can do a google hangout if anyone would like to work with me on this.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Mar 2021 22:37:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Filter-Data/m-p/543700#M37280</guid>
      <dc:creator>pglover12</dc:creator>
      <dc:date>2021-03-13T22:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: Filter Data</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Filter-Data/m-p/543702#M37281</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170665"&gt;@pglover12&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you events do not include a duration, you'll need to calculate one from a start and end event. For example:&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;Mar 13 00:23:00 host1 food: Restarted.
Mar 13 00:15:00 host1 food: Restarting...&lt;/LI-CODE&gt;&lt;P&gt;where host=host1 and process=food.&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;host=* process=* Restarting Restarted
| transaction host process startswith=Restarting endswith=Restarted
| eval duration_mins=duration / 60
| eval category=host.":".process
| stats sum(duration_mins) by category&lt;/LI-CODE&gt;&lt;P&gt;You can include multiple variations on start and end indicators.&lt;/P&gt;&lt;P&gt;The transaction command doesn't necessarily scale well, but a more detailed example of your source data would be required to provide a more scalable solution.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Mar 2021 23:00:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Filter-Data/m-p/543702#M37281</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2021-03-13T23:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Filter Data</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Filter-Data/m-p/543715#M37282</link>
      <description>&lt;P&gt;HI&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170665"&gt;@pglover12&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you have to identify the words to use for data classification and use them, e.g.:&lt;/P&gt;&lt;P&gt;error: error, panic, critical&lt;/P&gt;&lt;P&gt;authentication: login, logout, logfail&lt;/P&gt;&lt;P&gt;etc...&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;your-search
| eval type=case(searchmatch("error","error", searchmatch("panic","error", searchmatch("critical","error", searchmatch("login","authentication", searchmatch("logout","authentication",searchmatch("logfail","authentication")
| stats count BY type&lt;/LI-CODE&gt;&lt;P&gt;use this search as an approach for your searches.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Sun, 14 Mar 2021 07:15:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Filter-Data/m-p/543715#M37282</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2021-03-14T07:15:42Z</dc:date>
    </item>
  </channel>
</rss>

