<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can you help me with a complex subsearch? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384644#M112322</link>
    <description>&lt;P&gt;Maybe I could help if you give events sample for your requests&lt;/P&gt;</description>
    <pubDate>Thu, 03 Jan 2019 16:44:42 GMT</pubDate>
    <dc:creator>raphgoncalves</dc:creator>
    <dc:date>2019-01-03T16:44:42Z</dc:date>
    <item>
      <title>Can you help me with a complex subsearch?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384640#M112318</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;

&lt;P&gt;I use the request below in order to count degradation stop performances by service name&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="windows" sourcetype="wineventlog:microsoft-windows-diagnostics-performance/operational" Type=* OpCode="Détérioration de l’arrêt" TaskCategory="Analyse des performances d’arrêt" Nom_du_fichier=* "Durée de la dégradation"=* 
 | stats dc(Durée de la dégradation) as Total by Nom_du_fichier | sort -Total limit=10
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You can see the result here&lt;/P&gt;

&lt;P&gt;&lt;A href="https://cjoint.com/c/IAdiC08SQZd"&gt;https://cjoint.com/c/IAdiC08SQZd&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;Now, I want to match these requests with this one :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="windows-fr" sourcetype=WinRegistry key_path=\\registry\\machine\\software\\wow6432node\\xx\\master\\ConfigurationCountry | eval NATCO=if(key_path="\\registry\\machine\\software\\wow6432node\\xx\\master\\ConfigurationCountry",data, null)
| stats values(NATCO) as NATCO by host 
| stats dc(host) as host by NATCO | sort -NATCO limit=10
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;My goal is to count degradation stop performances by service name and by NATCO.&lt;/P&gt;

&lt;P&gt;So, I would like to have in a same table the same thing that there is in the capture but also with a NATCO column. &lt;/P&gt;

&lt;P&gt;Could you help me please??&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 08:39:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384640#M112318</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2019-01-03T08:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me with a complex subsearch?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384641#M112319</link>
      <description>&lt;P&gt;If you have a common ID, you could use "join" command : &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.0/SearchReference/Join"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.0/SearchReference/Join&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 09:18:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384641#M112319</guid>
      <dc:creator>raphgoncalves</dc:creator>
      <dc:date>2019-01-03T09:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me with a complex subsearch?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384642#M112320</link>
      <description>&lt;P&gt;I dont succeed...&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 16:38:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384642#M112320</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2019-01-03T16:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me with a complex subsearch?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384643#M112321</link>
      <description>&lt;P&gt;And no commun ID..&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 16:42:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384643#M112321</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2019-01-03T16:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me with a complex subsearch?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384644#M112322</link>
      <description>&lt;P&gt;Maybe I could help if you give events sample for your requests&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 16:44:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384644#M112322</guid>
      <dc:creator>raphgoncalves</dc:creator>
      <dc:date>2019-01-03T16:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me with a complex subsearch?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384645#M112323</link>
      <description>&lt;P&gt;I have done this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="windows" sourcetype="wineventlog:microsoft-windows-diagnostics-performance/operational" Type=* OpCode="Détérioration de l’arrêt" TaskCategory="Analyse des performances d’arrêt" Nom_du_fichier=* "Durée de la dégradation"=* | stats count by host   
| join host [search index=windows sourcetype=winregistry key_path="\\registry\\machine\\software\\wow6432node\\xx\\master\\ConfigurationCountry"  | eval NATCO=if(key_path=="\\registry\\machine\\software\\wow6432node\\xx\\master\\ConfigurationCountry",data, null) | stats latest(NATCO) as NATCO by host]
| stats values(NATCO) as NATCO by host | stats count as Total by NATCO
| sort -Total limit=10
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 04 Jan 2019 09:40:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384645#M112323</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2019-01-04T09:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me with a complex subsearch?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384646#M112324</link>
      <description>&lt;P&gt;so you have a common id &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; &lt;BR /&gt;
Great to know that it helped &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 09:42:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384646#M112324</guid>
      <dc:creator>raphgoncalves</dc:creator>
      <dc:date>2019-01-04T09:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me with a complex subsearch?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384647#M112325</link>
      <description>&lt;P&gt;thanks!!!!&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 11:15:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384647#M112325</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2019-01-04T11:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me with a complex subsearch?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384648#M112326</link>
      <description>&lt;P&gt;Just in case someone come over this question, I suggested OP to use "Join" Command :  &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.0/SearchReference/Join"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.0/SearchReference/Join&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;He came up with the following search&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="windows" sourcetype="wineventlog:microsoft-windows-diagnostics-performance/operational" Type=* OpCode="Détérioration de l’arrêt" TaskCategory="Analyse des performances d’arrêt" Nom_du_fichier=* "Durée de la dégradation"=* | stats count by host   
 | join host [search index=windows sourcetype=winregistry key_path="\\registry\\machine\\software\\wow6432node\\xx\\master\\ConfigurationCountry"  | eval NATCO=if(key_path=="\\registry\\machine\\software\\wow6432node\\xx\\master\\ConfigurationCountry",data, null) | stats latest(NATCO) as NATCO by host]
 | stats values(NATCO) as NATCO by host | stats count as Total by NATCO
 | sort -Total limit=10
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 04 Jan 2019 11:18:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Can-you-help-me-with-a-complex-subsearch/m-p/384648#M112326</guid>
      <dc:creator>raphgoncalves</dc:creator>
      <dc:date>2019-01-04T11:18:34Z</dc:date>
    </item>
  </channel>
</rss>

