<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What does  &amp;quot;bin _time span=100ms, eval H=len(_raw),transaction and maxevents&amp;quot; mean in this whole search? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/What-does-quot-bin-time-span-100ms-eval-H-len-raw-transaction/m-p/528023#M149061</link>
    <description>&lt;P&gt;Thank you for your response.&amp;nbsp;&lt;/P&gt;&lt;P&gt;what that time interval is doing i don't understand. Is it take 1 minute time difference from the times field and aggregate features on that basis like finding the mean of an packet size with a 1 minute time difference of values?&amp;nbsp;&lt;/P&gt;&lt;P&gt;what is count doing there then? Still have question about&amp;nbsp;&lt;SPAN&gt;An approximated covariance between two streams?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Nov 2020 20:22:37 GMT</pubDate>
    <dc:creator>M_fahad_hassan</dc:creator>
    <dc:date>2020-11-04T20:22:37Z</dc:date>
    <item>
      <title>What does  "bin _time span=100ms, eval H=len(_raw),transaction and maxevents" mean in this whole search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-does-quot-bin-time-span-100ms-eval-H-len-raw-transaction/m-p/527972#M149042</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am having confusion in understanding some portion of following search. Can anyone help me in understanding it please.&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=main | where cidrmatch("192.168.10.1285", src_ip)  AND dst_ip="192.168.10.61" OR cidrmatch("192.168.10.1285", dst_ip) AND src_ip="192.168.10.61" OR cidrmatch("192.168.10.1285", src_ip) AND cidrmatch("192.168.10.1285", dst_ip)  | bin _time span=1m | eval H=len(_raw) | stats count as W(H) mean(H) stdev(H) BY _time src_ip | join src_ip [search index=main | where cidrmatch("192.168.10.1285", src_ip)  AND dst_ip="192.168.10.61" OR cidrmatch("192.168.10.1285", dst_ip) AND src_ip="192.168.10.61" OR cidrmatch("192.168.10.1285", src_ip) AND cidrmatch("192.168.10.1285", dst_ip) | transaction src_ip dst_ip maxevents=2 | bin _time span=1m | eval HH_jit=len(_raw)  | stats count as W(HH_jit) mean(HH_jit) stdev(HH_jit) BY _time src_ip dst_ip] | join src_ip [search index=main | where cidrmatch("192.168.10.1285", src_ip)  AND dst_ip="192.168.10.61" OR cidrmatch("192.168.10.1285", dst_ip) AND src_ip="192.168.10.61" OR cidrmatch("192.168.10.1285", src_ip) AND cidrmatch("192.168.10.1285", dst_ip)  | bin _time span=1m | eval HpHp=len(_raw) | stats count as W(HpHp) mean(HpHp) stdev(HpHp) BY _time src_ip src_port dst_ip dst_port] | table _time W(H) mean(H) stdev(H)  W(HH_jit) mean(HH_jit) stdev(HH_jit) W(HpHp) mean(HpHp) stdev(HpHp) magnitude(HpHp) radius(HpHp) covariance(HpHp) correlation(HpHp)&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;It is used for the extraction of statistical features on the base of time frame like 35ms, 100ms, 1m. I am not understanding what it actually mean by &lt;STRONG&gt;time frame &lt;/STRONG&gt;in it&lt;STRONG&gt;.&lt;/STRONG&gt; what is the mean of "&lt;STRONG&gt;bin _time span&lt;/STRONG&gt;", "&lt;STRONG&gt;eval H=len(_raw)&lt;/STRONG&gt;" , "&lt;STRONG&gt;transaction&lt;/STRONG&gt;" , "&lt;STRONG&gt;maxevents&lt;/STRONG&gt; =2" means ? what is count doing here ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;covariance: An approximated covariance between two streams.&amp;nbsp;&lt;STRONG&gt;what is mean between two streams here?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Here is some information use for aggregating the features&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;H=packet size transfer in a unidirectional&amp;nbsp; (host to all)&lt;/P&gt;
&lt;P&gt;HH_jit =&amp;nbsp;difference in time between transaction with the same IP values(host to host)&lt;/P&gt;
&lt;P&gt;HpHp= packet transfer from host to host taking ports&amp;nbsp;(host: port to host: port)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I have read from splunk search reference page about these different terms but not getting a clear picture about this particular case.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need urgent help, i would appreciate a reply as soon as possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2020 17:30:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-does-quot-bin-time-span-100ms-eval-H-len-raw-transaction/m-p/527972#M149042</guid>
      <dc:creator>M_fahad_hassan</dc:creator>
      <dc:date>2020-11-04T17:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: What does  "bin _time span=100ms, eval H=len(_raw),transaction and maxevents" mean in this whole search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-does-quot-bin-time-span-100ms-eval-H-len-raw-transaction/m-p/527994#M149055</link>
      <description>&lt;P&gt;The &lt;FONT face="courier new,courier"&gt;bin&lt;/FONT&gt; command puts events into groups ("bins") based on the field name supplied.&amp;nbsp; Bin sizes are specified by the &lt;FONT face="courier new,courier"&gt;span&lt;/FONT&gt; option, in this case.&amp;nbsp; In this query, the command is grouping timestamps (_time) into 1-minute intervals.&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;eval H=len(_raw)&lt;/FONT&gt; is finding the number of characters in the _raw field and storing that value in the field called "H".&lt;/P&gt;&lt;P&gt;The &lt;FONT face="courier new,courier"&gt;transaction&lt;/FONT&gt; command groups multiple events with the same values for the specified fields into a single event.&amp;nbsp; The &lt;FONT face="courier new,courier"&gt;maxevents=2&lt;/FONT&gt; option says each grouping must contain no more than 2 events.&lt;/P&gt;&lt;P&gt;RTFM:&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.1.0/SearchReference/Bin" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.1.0/SearchReference/Bin&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2020 18:25:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-does-quot-bin-time-span-100ms-eval-H-len-raw-transaction/m-p/527994#M149055</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-11-04T18:25:42Z</dc:date>
    </item>
    <item>
      <title>Re: What does  "bin _time span=100ms, eval H=len(_raw),transaction and maxevents" mean in this whole search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-does-quot-bin-time-span-100ms-eval-H-len-raw-transaction/m-p/528023#M149061</link>
      <description>&lt;P&gt;Thank you for your response.&amp;nbsp;&lt;/P&gt;&lt;P&gt;what that time interval is doing i don't understand. Is it take 1 minute time difference from the times field and aggregate features on that basis like finding the mean of an packet size with a 1 minute time difference of values?&amp;nbsp;&lt;/P&gt;&lt;P&gt;what is count doing there then? Still have question about&amp;nbsp;&lt;SPAN&gt;An approximated covariance between two streams?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2020 20:22:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-does-quot-bin-time-span-100ms-eval-H-len-raw-transaction/m-p/528023#M149061</guid>
      <dc:creator>M_fahad_hassan</dc:creator>
      <dc:date>2020-11-04T20:22:37Z</dc:date>
    </item>
  </channel>
</rss>

