<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Generate a lookup for EPS in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487383#M136217</link>
    <description>&lt;P&gt;Utilizing some suggestions here and a little more digging, what I came up with was the following:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| tstats count as COUNT where index=firewall earliest=-7d by host, _time span=1s&lt;/CODE&gt;&lt;BR /&gt;
&lt;CODE&gt;| stats avg(COUNT) as eps by host&lt;/CODE&gt;&lt;BR /&gt;
&lt;CODE&gt;| eval eps=round(eps,2)&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;This produced the table I was after that I could then output to a lookup.&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jan 2020 15:14:47 GMT</pubDate>
    <dc:creator>csprice</dc:creator>
    <dc:date>2020-01-15T15:14:47Z</dc:date>
    <item>
      <title>Generate a lookup for EPS</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487378#M136212</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;

&lt;P&gt;I have an index with traffic from 10 devices.  I want to generate a lookup that contains the avg EPS over the course of 7 days utilizing tstats.&lt;/P&gt;

&lt;P&gt;my current search - cobbled together from scouring answers:&lt;BR /&gt;
| tstats count as COUNT where index=firewall earliest=-7d by _time, host span=1s&lt;BR /&gt;
| timechart span=1h max(COUNT) as eps by host&lt;/P&gt;

&lt;P&gt;kind of works, but spits out &amp;gt;50000 rows.  What I'd like is a host - xxx eps looking over the past 7 days.&lt;/P&gt;

&lt;P&gt;Any pointers would be appreciated&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 19:44:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487378#M136212</guid>
      <dc:creator>csprice</dc:creator>
      <dc:date>2020-01-14T19:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: Generate a lookup for EPS</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487379#M136213</link>
      <description>&lt;P&gt;It's not as fast as &lt;CODE&gt;tstats&lt;/CODE&gt;, but this query should do the job,&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal source=*metrics.log group=per_index_thruput series=firewall earliest=-7d 
| bucket span=1h _time 
| stats max(eps) by host
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 14 Jan 2020 20:22:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487379#M136213</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-01-14T20:22:04Z</dc:date>
    </item>
    <item>
      <title>Re: Generate a lookup for EPS</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487380#M136214</link>
      <description>&lt;P&gt;Thank you Rich for your response.  However, this isn't quite what I was after.  This gave me a list of my splunk infrastructure and max eps.&lt;/P&gt;

&lt;P&gt;I'm trying to look at my firewall index and pull out the hosts that are pushing data there.  Then just keep track of their EPS.  That way I can run a correlation search to check and see when/if their EPS falls off to create a notable in ES.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 20:30:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487380#M136214</guid>
      <dc:creator>csprice</dc:creator>
      <dc:date>2020-01-14T20:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: Generate a lookup for EPS</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487381#M136215</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;| tstats count as COUNT where index=firewall earliest=-7d latest=-6d by _time, host span=1s
| timechart span=1h max(COUNT) as eps by host
| append [ | tstats count as COUNT where index=firewall earliest=-6d latest=-5d by _time, host span=1s
| timechart span=1h max(COUNT) as eps by host]
| append [ | tstats count as COUNT where index=firewall earliest=-5d latest=-4d by _time, host span=1s
| timechart span=1h max(COUNT) as eps by host]
| append [ | tstats count as COUNT where index=firewall earliest=-4d latest=3d by _time, host span=1s
| timechart span=1h max(COUNT) as eps by host]
| append [ | tstats count as COUNT where index=firewall earliest=-3d latest=-2d by _time, host span=1s
| timechart span=1h max(COUNT) as eps by host]
| append [ | tstats count as COUNT where index=firewall earliest=-2d latest=-1d by _time, host span=1s
| timechart span=1h max(COUNT) as eps by host]
| append [ | tstats count as COUNT where index=firewall earliest=-1d by _time, host span=1s
| timechart span=1h max(COUNT) as eps by host]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;hi, @csprice &lt;BR /&gt;
will you stack &lt;CODE&gt;append&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 21:24:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487381#M136215</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-01-14T21:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: Generate a lookup for EPS</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487382#M136216</link>
      <description>&lt;P&gt;@to4kawa Thank you for your response, but this essentially does the same as my initial search.  I'm looking for output similar to the one Rich Galloway put out - just one that looks at the network devices inside the firewall index.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 13:09:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487382#M136216</guid>
      <dc:creator>csprice</dc:creator>
      <dc:date>2020-01-15T13:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: Generate a lookup for EPS</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487383#M136217</link>
      <description>&lt;P&gt;Utilizing some suggestions here and a little more digging, what I came up with was the following:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| tstats count as COUNT where index=firewall earliest=-7d by host, _time span=1s&lt;/CODE&gt;&lt;BR /&gt;
&lt;CODE&gt;| stats avg(COUNT) as eps by host&lt;/CODE&gt;&lt;BR /&gt;
&lt;CODE&gt;| eval eps=round(eps,2)&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;This produced the table I was after that I could then output to a lookup.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 15:14:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Generate-a-lookup-for-EPS/m-p/487383#M136217</guid>
      <dc:creator>csprice</dc:creator>
      <dc:date>2020-01-15T15:14:47Z</dc:date>
    </item>
  </channel>
</rss>

