<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to create a PIE chart for multiple subsearches? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-PIE-chart-for-multiple-subsearches/m-p/374104#M109964</link>
    <description>&lt;P&gt;Hi &lt;/P&gt;

&lt;P&gt;How can I create a PIE chart using multiple subsearches?&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;notable&lt;/CODE&gt; | search source="&lt;EM&gt;ENV: Windows Privilege Escalation&lt;/EM&gt;" OR source="&lt;EM&gt;ENV:interactive login&lt;/EM&gt;" OR source="&lt;EM&gt;Env:Concurrent Login Attempts Detected&lt;/EM&gt;"  | stats count as Win | appendcols  [search &lt;CODE&gt;notable&lt;/CODE&gt; | search source="&lt;EM&gt;ENV*virus&lt;/EM&gt;" OR source=&lt;EM&gt;malware&lt;/EM&gt;| stats count as AV] | appendcols [search &lt;CODE&gt;notable&lt;/CODE&gt; | search source="&lt;EM&gt;env*intrusion&lt;/EM&gt;" | stats count as Intrusion] | appendcols [search &lt;CODE&gt;notable&lt;/CODE&gt; | search source="&lt;EM&gt;env*email&lt;/EM&gt;" | stats count as Email] | appendcols [search &lt;CODE&gt;notable&lt;/CODE&gt; | search source="&lt;EM&gt;env*vul&lt;/EM&gt;" | stats count as Vuler] &lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 18:03:02 GMT</pubDate>
    <dc:creator>vkumar6</dc:creator>
    <dc:date>2020-09-29T18:03:02Z</dc:date>
    <item>
      <title>How to create a PIE chart for multiple subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-PIE-chart-for-multiple-subsearches/m-p/374104#M109964</link>
      <description>&lt;P&gt;Hi &lt;/P&gt;

&lt;P&gt;How can I create a PIE chart using multiple subsearches?&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;notable&lt;/CODE&gt; | search source="&lt;EM&gt;ENV: Windows Privilege Escalation&lt;/EM&gt;" OR source="&lt;EM&gt;ENV:interactive login&lt;/EM&gt;" OR source="&lt;EM&gt;Env:Concurrent Login Attempts Detected&lt;/EM&gt;"  | stats count as Win | appendcols  [search &lt;CODE&gt;notable&lt;/CODE&gt; | search source="&lt;EM&gt;ENV*virus&lt;/EM&gt;" OR source=&lt;EM&gt;malware&lt;/EM&gt;| stats count as AV] | appendcols [search &lt;CODE&gt;notable&lt;/CODE&gt; | search source="&lt;EM&gt;env*intrusion&lt;/EM&gt;" | stats count as Intrusion] | appendcols [search &lt;CODE&gt;notable&lt;/CODE&gt; | search source="&lt;EM&gt;env*email&lt;/EM&gt;" | stats count as Email] | appendcols [search &lt;CODE&gt;notable&lt;/CODE&gt; | search source="&lt;EM&gt;env*vul&lt;/EM&gt;" | stats count as Vuler] &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 18:03:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-PIE-chart-for-multiple-subsearches/m-p/374104#M109964</guid>
      <dc:creator>vkumar6</dc:creator>
      <dc:date>2020-09-29T18:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a PIE chart for multiple subsearches?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-PIE-chart-for-multiple-subsearches/m-p/374105#M109965</link>
      <description>&lt;P&gt;Try this &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`notable` | search source="*ENV: Windows Privilege Escalation*" OR source="*ENV:interactive login*" OR source="*Env:Concurrent Login Attempts Detected*"  | stats count | eval Type="Win" | append  [search `notable` | search source="*ENV*virus*" OR source=*malware*| stats count | eval Type="AV"] | append [search `notable` | search source="*env*intrusion*" | stats count | eval Type="Intrusion" ] | append [search `notable` | search source="*env*email*" | stats count | eval Type="Email" ] | append [search `notable` | search source="*env*vul*" | stats count | eval Type="Vuler"] 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;OR Better...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`notable` 
| search (source="*ENV: Windows Privilege Escalation*" OR source="*ENV:interactive login*" OR source="*Env:Concurrent Login Attempts Detected*" ) OR (source="*ENV*virus*" OR source=*malware*) OR (source="*env*intrusion*") OR (source="*env*email*") OR (source="*env*vul*")
| eval Type=case((source="*ENV: Windows Privilege Escalation*" OR source="*ENV:interactive login*" OR source="*Env:Concurrent Login Attempts Detected*" ),"Win",(source="*ENV*virus*" OR source=*malware*),"AV", (source="*env*intrusion*"),"Intrusion", (source="*env*email*") ,"Email", (source="*env*vul*"),"Vulenr")
| stats count by Type
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 13 Feb 2018 20:44:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-PIE-chart-for-multiple-subsearches/m-p/374105#M109965</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2018-02-13T20:44:29Z</dc:date>
    </item>
  </channel>
</rss>

