<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: organizing multiple responses in Reporting</title>
    <link>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126958#M2874</link>
    <description>&lt;P&gt;Can you use the &lt;EM&gt;eval&lt;/EM&gt; command to set a new Success/Failure field?&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;sourcetype="WMI:WinEventLog:Application" EventCode=57755 OR EventCode=34112 OR EventCode=34113 OR EventCode=34114 | eval Outcome=case(EventCode==57755 OR EventCode==34112, "Success", EventCode==34113 OR EventCode==34114, "Failure") | search Outcome="Success" | stats count by host, Outcome&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;(Edit: minor fixes to the EventCode search and eval portions.)&lt;/P&gt;</description>
    <pubDate>Mon, 27 Jan 2014 19:07:06 GMT</pubDate>
    <dc:creator>dglinder</dc:creator>
    <dc:date>2014-01-27T19:07:06Z</dc:date>
    <item>
      <title>organizing multiple responses</title>
      <link>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126956#M2872</link>
      <description>&lt;P&gt;How do you query an application log for multiple event codes and then organize them in a report based on what codes were seen?&lt;/P&gt;

&lt;P&gt;I'm searching 40+ server application logs for backup exec codes and based upon success (34112 or 57755) or failure (34113 or 34114) Output the count to either a success or failure column organized by host name.&lt;/P&gt;

&lt;P&gt;I know a way (though probably not the best way) to do either a success or failure, but not how to combine.&lt;/P&gt;

&lt;P&gt;What I've got so far is&lt;BR /&gt;
sourcetype="WMI:WinEventLog:Application" EventCode=57755 OR 34112 | stats count by tag, host | rename count as Success&lt;/P&gt;

&lt;P&gt;It works, but is only looking for instances when thing went correctly.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2014 18:41:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126956#M2872</guid>
      <dc:creator>jsmith39</dc:creator>
      <dc:date>2014-01-27T18:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: organizing multiple responses</title>
      <link>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126957#M2873</link>
      <description>&lt;P&gt;You can append the failure code data:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;sourcetype="WMI:WinEventLog:Application" EventCode=57755 OR EventCode=34112 | stats count by tag, host | rename count as Success |append [search index=main sourcetype="WMI:WinEventLog:Application" EventCode=34113 OR EventCode=34114| stats count by tag, host | rename count as Failure]&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2014 18:59:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126957#M2873</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2014-01-27T18:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: organizing multiple responses</title>
      <link>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126958#M2874</link>
      <description>&lt;P&gt;Can you use the &lt;EM&gt;eval&lt;/EM&gt; command to set a new Success/Failure field?&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;sourcetype="WMI:WinEventLog:Application" EventCode=57755 OR EventCode=34112 OR EventCode=34113 OR EventCode=34114 | eval Outcome=case(EventCode==57755 OR EventCode==34112, "Success", EventCode==34113 OR EventCode==34114, "Failure") | search Outcome="Success" | stats count by host, Outcome&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;(Edit: minor fixes to the EventCode search and eval portions.)&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2014 19:07:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126958#M2874</guid>
      <dc:creator>dglinder</dc:creator>
      <dc:date>2014-01-27T19:07:06Z</dc:date>
    </item>
    <item>
      <title>Re: organizing multiple responses</title>
      <link>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126959#M2875</link>
      <description>&lt;P&gt;Thank you very much!&lt;BR /&gt;
Both of those queries worked perfectly if differently.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2014 19:13:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126959#M2875</guid>
      <dc:creator>jsmith39</dc:creator>
      <dc:date>2014-01-27T19:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: organizing multiple responses</title>
      <link>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126960#M2876</link>
      <description>&lt;P&gt;Thanks lukejadamec - I've update the example.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2014 19:25:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126960#M2876</guid>
      <dc:creator>dglinder</dc:creator>
      <dc:date>2014-01-27T19:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: organizing multiple responses</title>
      <link>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126961#M2877</link>
      <description>&lt;P&gt;I don't use sub-searches so I always forget their usefulness.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2014 19:27:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/organizing-multiple-responses/m-p/126961#M2877</guid>
      <dc:creator>dglinder</dc:creator>
      <dc:date>2014-01-27T19:27:47Z</dc:date>
    </item>
  </channel>
</rss>

