<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dashboard to show count of unique alerts based on host in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/552425#M156795</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;so like for example from the below error, I would like to extract hostname which is after second : then comp&amp;nbsp; which is after fourth : [the first value under square brackets] then the iid value and then the error&amp;nbsp; message which is after fifth : and until punctuation. I am trying to build a dashboard that lets me select these values starting with Instance value (i.e. iid), hostname, then component and should display all the corresponding error&amp;nbsp; messages based on the first 3 selection.&lt;/P&gt;&lt;P&gt;May 20 10:25:49 200.0.0.43 77042: noxxxxaa01a: May 20 2021 14:25:46.549 +0000: %ICM_Logger_NodeManager-4-102C10A: %[comp=Logger-B][pname=nm][iid=abcde][mid=102C10A][sev=warning]: Node: ICM\abcde\LoggerB, restarting process: clgr, after having delayed restart for 10 seconds.&lt;/P&gt;&lt;P&gt;host = 200.0.0.0 source = xyz sourcetype = cisco_syslog&lt;/P&gt;&lt;P&gt;I need to extract instance which is the value of iid(i.e. abcde) then hostname which is noxxxxaa01a then the value of comp(i.e.Logger-B) if all three match then all the corresponding error events should show up for each process (which is value of pname) which is "Node: ICM\abcde\LoggerB, restarting process: clgr, after having delayed restart for 10 seconds"&lt;/P&gt;&lt;P&gt;May 20 10:25:42 200.0.0.43 77039: noxxxxaa02a: May 20 2021 14:25:40.899 +0000: %ICM_PG_DeviceManagement-3-10F801F: %[comp=PG2-B][pname=pgag][iid=abcde][mid=10F801F][sev=error]: Connection to central controller side: A failed (high priority).&lt;/P&gt;&lt;P&gt;host = 200.0.0.43 source = xyz sourcetype = cisco_syslog&lt;/P&gt;&lt;P&gt;More example like for above instance would be abcde then hostname should give me dropdown with values for the instances found in errors then comp should give me dropdown of values found for the match of selected instance &amp;amp; hostname then should give me corrsponding pname value and alert&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 May 2021 15:49:01 GMT</pubDate>
    <dc:creator>harry_123</dc:creator>
    <dc:date>2021-05-20T15:49:01Z</dc:date>
    <item>
      <title>Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551506#M156506</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have alerts that look like below&lt;/P&gt;&lt;P&gt;May 13 17:15:30 11.2.3.22 0000017768: NOXXXXXX10A: May 13 2021 17:15:30.467 -0400: %XYZ_11_6_INFRASTRUCTURE-4-SNMP_CONNECTION_FAILURE: Connection to the SNMP Subagent failed. Retrying next port in specified minutes. [id:9909]&lt;/P&gt;&lt;P&gt;host = 11.2.3.22 | source = XYZ | sourcetype = ABCD_syslog&lt;/P&gt;&lt;P&gt;May 7 21:29:20 11.2.3.22 0000043782: NOXXXXXX10A: May 07 2021 21:29:20.259 -0400: %XYZ_11_6____________IVR-3-API_INFO: VXML connection RESET RemoteAddress=11.2.3.24,RemotePort=40517,LocalAddress=11.2.3.22,LocalPort=8002 [id:3205]&lt;/P&gt;&lt;P&gt;host = 11.2.3.22 | source = XYZ | sourcetype = ABCD_syslog&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Basically, I am trying to report a count on unique alerts such as "Connection to the SNMP Subagent failed", "VXML connection RESET" for host&amp;nbsp;11.2.3.22. So in dashboard when I select host 11.2.3.22, it gives me count of unique alerts for past 24 hours. I also want to create another dashboard that gives me a dropdown of all these unique alerts (it should be substrings such as VXML connection RESET,&amp;nbsp;Connection to the SNMP Subagent failed.) for source XYZ in past 24 hours&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 22:01:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551506#M156506</guid>
      <dc:creator>harry_123</dc:creator>
      <dc:date>2021-05-13T22:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551545#M156516</link>
      <description>&lt;P&gt;Have you extracted any fields? Assuming the _raw data starts with the host ip address and all events have a similar structure e.g. the alert message starts after the 4th ": ", and it is enough to just use the beginning of the alert message up to the first punctuation, you could try this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;--- your search ---
| rex "(?&amp;lt;host&amp;gt;[^\s]+)\s(.+\:\s){4}(?&amp;lt;msg&amp;gt;[\w\s]+)"
| stats count by host msg&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 14 May 2021 07:06:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551545#M156516</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-05-14T07:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551883#M156611</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp; That's a great idea. that's what I was looking for. Now all my raw data starts with Date &amp;amp; time stamp followed by host ip address (like indicated below). How should the expression look like to filter the IP address and also the alert message starts after the 4th ":" and would like to use the alert message upto the " [id:" field.&lt;/P&gt;&lt;DIV class="main-section-body dashboard-body"&gt;&lt;DIV class="dashboard view-mode"&gt;&lt;DIV class="dashboard-layout-row-column dashboard-layout-rowcolumn-rowcolumnlayout"&gt;&lt;DIV class="dashboard-row dashboard-layout-rowcolumn-row"&gt;&lt;DIV class="dashboard-cell dashboard-layout-panel last-visible"&gt;&lt;DIV class="dashboard-panel dashboardPanel---pages-dark---8-1-4---1UN1T"&gt;&lt;DIV class="panel-element-row"&gt;&lt;DIV class="dashboard-element event active"&gt;&lt;DIV class="panel-body dashboard-element-body"&gt;&lt;DIV class="splunk-view splunk-events-viewer"&gt;&lt;DIV class="lazy-view-container lazy-events-viewer shared-eventsviewer-lazyeventsviewer"&gt;&lt;DIV class="shared-eventsviewer"&gt;&lt;DIV class="scrolling-table-wrapper shared-eventsviewer-list"&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="raw-event normal  wrap "&gt;May 7 21:38:06 20.0.0.00&lt;/DIV&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="main-section-body dashboard-body"&gt;&lt;DIV class="dashboard view-mode"&gt;&lt;DIV class="dashboard-layout-row-column dashboard-layout-rowcolumn-rowcolumnlayout"&gt;&lt;DIV class="dashboard-row dashboard-layout-rowcolumn-row"&gt;&lt;DIV class="dashboard-cell dashboard-layout-panel last-visible"&gt;&lt;DIV class="dashboard-panel dashboardPanel---pages-dark---8-1-4---1UN1T"&gt;&lt;DIV class="panel-element-row"&gt;&lt;DIV class="dashboard-element event active"&gt;&lt;DIV class="panel-body dashboard-element-body"&gt;&lt;DIV class="splunk-view splunk-events-viewer"&gt;&lt;DIV class="lazy-view-container lazy-events-viewer shared-eventsviewer-lazyeventsviewer"&gt;&lt;DIV class="shared-eventsviewer"&gt;&lt;DIV class="scrolling-table-wrapper shared-eventsviewer-list"&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="shared-eventsviewer-shared-rawfield"&gt;&lt;DIV class="raw-event normal  wrap "&gt;VXML connection RESET RemoteAddress=20.0.0.0,RemotePort=58737,LocalAddress=30.0.0.0,LocalPort=8002 &lt;FONT color="#FF0000"&gt;[id:3205]&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 17 May 2021 15:16:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551883#M156611</guid>
      <dc:creator>harry_123</dc:creator>
      <dc:date>2021-05-17T15:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551885#M156612</link>
      <description>&lt;LI-CODE lang="markup"&gt;--- your search ---
| rex "\w+\s\d+\s\d+:\d+:\d+\s(?&amp;lt;host&amp;gt;[^\s]+)\s(.+\:\s){4}(?&amp;lt;msg&amp;gt;.+?)\s\[id:"
| stats count by host msg&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 17 May 2021 15:36:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551885#M156612</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-05-17T15:36:16Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551913#M156616</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;I tried this and missing something here..It completely misses messages like below and only catches certain ones. may be due to the spacing inconsistency&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;May 7 21:22:09 20.0.0.00 0000000549: NOXXXXXXXXX: May 07 2021 21:22:09.133 -0400: %XYZ_11_6____________ICM-3-LOGMSG_ICM_SS_GENERAL_INFO:&amp;nbsp; &amp;nbsp;new VRU PIM connection SYN RemoteAddress=30.000.00.00,RemotePort=53249,LocalAddress=20.0.0.00,LocalPort=5000 [id:2007]&lt;/P&gt;&lt;P&gt;host = 20.0.0.00 | source = XYZ | sourcetype = XYZ_syslog&lt;/P&gt;&lt;P&gt;May 7 21:22:00 20.0.0.00 0000000545: NOQCJACC50A: May 07 2021 21:22:00.367 -0400: %XYZ_11_6____________ICM-6-LOGMSG_ICM_SS_GENERAL_INFO:&amp;nbsp; :&amp;nbsp; Registering Handshake Timer 30000 millisecs before terminating. [id:2007]&lt;/P&gt;&lt;P&gt;host = 20.0.0.00 | source = XYZ | sourcetype = XYZ_syslog&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 17:54:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551913#M156616</guid>
      <dc:creator>harry_123</dc:creator>
      <dc:date>2021-05-17T17:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551917#M156618</link>
      <description>&lt;P&gt;What were you expecting to have been extracted from these events and what if anything were you getting?&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 18:21:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/551917#M156618</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-05-17T18:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/552425#M156795</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;so like for example from the below error, I would like to extract hostname which is after second : then comp&amp;nbsp; which is after fourth : [the first value under square brackets] then the iid value and then the error&amp;nbsp; message which is after fifth : and until punctuation. I am trying to build a dashboard that lets me select these values starting with Instance value (i.e. iid), hostname, then component and should display all the corresponding error&amp;nbsp; messages based on the first 3 selection.&lt;/P&gt;&lt;P&gt;May 20 10:25:49 200.0.0.43 77042: noxxxxaa01a: May 20 2021 14:25:46.549 +0000: %ICM_Logger_NodeManager-4-102C10A: %[comp=Logger-B][pname=nm][iid=abcde][mid=102C10A][sev=warning]: Node: ICM\abcde\LoggerB, restarting process: clgr, after having delayed restart for 10 seconds.&lt;/P&gt;&lt;P&gt;host = 200.0.0.0 source = xyz sourcetype = cisco_syslog&lt;/P&gt;&lt;P&gt;I need to extract instance which is the value of iid(i.e. abcde) then hostname which is noxxxxaa01a then the value of comp(i.e.Logger-B) if all three match then all the corresponding error events should show up for each process (which is value of pname) which is "Node: ICM\abcde\LoggerB, restarting process: clgr, after having delayed restart for 10 seconds"&lt;/P&gt;&lt;P&gt;May 20 10:25:42 200.0.0.43 77039: noxxxxaa02a: May 20 2021 14:25:40.899 +0000: %ICM_PG_DeviceManagement-3-10F801F: %[comp=PG2-B][pname=pgag][iid=abcde][mid=10F801F][sev=error]: Connection to central controller side: A failed (high priority).&lt;/P&gt;&lt;P&gt;host = 200.0.0.43 source = xyz sourcetype = cisco_syslog&lt;/P&gt;&lt;P&gt;More example like for above instance would be abcde then hostname should give me dropdown with values for the instances found in errors then comp should give me dropdown of values found for the match of selected instance &amp;amp; hostname then should give me corrsponding pname value and alert&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 15:49:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/552425#M156795</guid>
      <dc:creator>harry_123</dc:creator>
      <dc:date>2021-05-20T15:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/552454#M156811</link>
      <description>&lt;P&gt;How does this work for you?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "\w+\s\d+\s\d+:\d+:\d+\s(?&amp;lt;host&amp;gt;[^\s]+)\s.*?:\s(?&amp;lt;hostname&amp;gt;[^:]+):\s.*?:\s+(.*?)\:\s+((?&amp;lt;msg&amp;gt;.+)\s\[id|.+comp=(?&amp;lt;component&amp;gt;[^\]]+).*?iid=(?&amp;lt;instanceid&amp;gt;[^\]]+).*?:\s(?&amp;lt;mess&amp;gt;.+))"&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 20 May 2021 19:58:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/552454#M156811</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-05-20T19:58:30Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/552498#M156826</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp; Thank you so much!! The only thing I would need is extracting date, time in the below query as well that I would like to display in two separate columns along with this events.&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 06:06:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/552498#M156826</guid>
      <dc:creator>harry_123</dc:creator>
      <dc:date>2021-05-21T06:06:10Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/552505#M156830</link>
      <description>&lt;LI-CODE lang="markup"&gt;| rex "\w+\s\d+\s\d+:\d+:\d+\s(?&amp;lt;host&amp;gt;[^\s]+)\s.*?:\s(?&amp;lt;hostname&amp;gt;[^:]+):\s(?&amp;lt;datetime&amp;gt;.*?):\s+(.*?)\:\s+((?&amp;lt;msg&amp;gt;.+)\s\[id|.+comp=(?&amp;lt;component&amp;gt;[^\]]+).*?iid=(?&amp;lt;instanceid&amp;gt;[^\]]+).*?:\s(?&amp;lt;mess&amp;gt;.+))"&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 21 May 2021 06:32:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/552505#M156830</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-05-21T06:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/552817#M156920</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;I was able to expand your query to get me what I want. However the alerts that I am showing are all random (no particular order). How do I get them to show the count of Error that has the most recent event. I tried sort Date,Time at the end of below query but didn't work. I don't necessarily want Date,Time columns to appear but just give me the count of errors for each listed below components, ProcessNames in descending order per date,time (i.e. something like check the most recent date,time occurence of the event and if its latest that should display on top). In my dashboard I will have last 24 hours or last 15 mins etc so accordingly it should show me count for most recent error occurences then going back in time. Also, there is a particular error msg that keeps repeating every 5 mins (listed below), I only want the latest occurence of this event and not anything prior. How do I incorporate that as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;rex "^(?P&amp;lt;Date&amp;gt;\w+\s+\d+)\s+(?P&amp;lt;Time&amp;gt;\d+:\d+:\d+)\s(?&amp;lt;host&amp;gt;[^\s]+)\s.*?:\s(?&amp;lt;hostname&amp;gt;[^:]+):\s.*?:\s+(.*?)\:\s+((?&amp;lt;msg&amp;gt;.+)\s\[id|.+comp=(?&amp;lt;component&amp;gt;[^\]]+).+pname=(?&amp;lt;ProcessName&amp;gt;[^\]]+).*?iid=(?&amp;lt;instanceid&amp;gt;[^\]]+).*?:\s(?&amp;lt;Error&amp;gt;.+))" | stats count by ProcessName,component,hostname,Error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The network communications between ICM router and Peripheral Gateway or NIC: PGx2 has been down for: 10 minutes.&lt;BR /&gt;The network communications between ICM router and Peripheral Gateway or NIC: PGx2 has been down for: 15 minutes.&lt;BR /&gt;The network communications between ICM router and Peripheral Gateway or NIC: PGx2 has been down for: 20 minutes.&lt;/P&gt;</description>
      <pubDate>Mon, 24 May 2021 17:40:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/552817#M156920</guid>
      <dc:creator>harry_123</dc:creator>
      <dc:date>2021-05-24T17:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/553010#M156973</link>
      <description>&lt;P&gt;As there is little illustration of search output and desired output, I construct this simulator to make the simplest mix of fields:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults count=80
| streamstats count
| eval _time = _time - count * 3600, hostname = "hostname" . (random() % 2 + 1), Error = "error" . (random() % 2 + 1), ProcessName = "process" . (random() % 2 + 1), component = "component" . (random() % 2 + 1)
| fields - count&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It renders sample data like the following:&lt;/P&gt;&lt;DIV class="search-results-statisticspane-statisticscontrols"&gt;&lt;DIV class="statistics-controls-inner"&gt;&lt;DIV class="statistics-controls-inner-cover"&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Error&lt;/TD&gt;&lt;TD&gt;processName&lt;/TD&gt;&lt;TD&gt;_time&lt;/TD&gt;&lt;TD&gt;component&lt;/TD&gt;&lt;TD&gt;hostname&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;error1&lt;/TD&gt;&lt;TD&gt;process2&lt;/TD&gt;&lt;TD&gt;2021-05-25 17:14:04&lt;/TD&gt;&lt;TD&gt;component2&lt;/TD&gt;&lt;TD&gt;hostname1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;error1&lt;/TD&gt;&lt;TD&gt;process2&lt;/TD&gt;&lt;TD&gt;2021-05-25 16:14:04&lt;/TD&gt;&lt;TD&gt;component2&lt;/TD&gt;&lt;TD&gt;hostname1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;error1&lt;/TD&gt;&lt;TD&gt;process2&lt;/TD&gt;&lt;TD&gt;2021-05-25 15:14:04&lt;/TD&gt;&lt;TD&gt;component1&lt;/TD&gt;&lt;TD&gt;hostname1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;error2&lt;/TD&gt;&lt;TD&gt;process2&lt;/TD&gt;&lt;TD&gt;2021-05-25 14:14:04&lt;/TD&gt;&lt;TD&gt;component1&lt;/TD&gt;&lt;TD&gt;hostname1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;error1&lt;/TD&gt;&lt;TD&gt;process2&lt;/TD&gt;&lt;TD&gt;2021-05-25 13:14:04&lt;/TD&gt;&lt;TD&gt;component1&lt;/TD&gt;&lt;TD&gt;hostname2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;error1&lt;/TD&gt;&lt;TD&gt;process1&lt;/TD&gt;&lt;TD&gt;2021-05-25 12:14:04&lt;/TD&gt;&lt;TD&gt;component1&lt;/TD&gt;&lt;TD&gt;hostname2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;error1&lt;/TD&gt;&lt;TD&gt;process1&lt;/TD&gt;&lt;TD&gt;2021-05-25 11:14:04&lt;/TD&gt;&lt;TD&gt;component1&lt;/TD&gt;&lt;TD&gt;hostname1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;error2&lt;/TD&gt;&lt;TD&gt;process2&lt;/TD&gt;&lt;TD&gt;2021-05-25 10:14:04&lt;/TD&gt;&lt;TD&gt;component1&lt;/TD&gt;&lt;TD&gt;hostname1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;error2&lt;/TD&gt;&lt;TD&gt;process2&lt;/TD&gt;&lt;TD&gt;2021-05-25 09:14:04&lt;/TD&gt;&lt;TD&gt;component2&lt;/TD&gt;&lt;TD&gt;hostname1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;error1&lt;/TD&gt;&lt;TD&gt;process1&lt;/TD&gt;&lt;TD&gt;2021-05-25 08:14:04&lt;/TD&gt;&lt;TD&gt;component1&lt;/TD&gt;&lt;TD&gt;hostname2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;error1&lt;/TD&gt;&lt;TD&gt;process1&lt;/TD&gt;&lt;TD&gt;2021-05-25 07:14:04&lt;/TD&gt;&lt;TD&gt;component1&lt;/TD&gt;&lt;TD&gt;hostname1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;...&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="shared-reportvisualizer"&gt;&lt;DIV class="viz-controller"&gt;&lt;DIV class="facets-container"&gt;&lt;DIV class="viz-panel  viz-facet-size-medium"&gt;&lt;DIV class="lazy-view-container lazy-results-table shared-resultstable-lazyresultstable"&gt;&lt;DIV class="shared-resultstabledrilldown results-table"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;You can use eventstats to find the latest error per host, component, and process combination "| eventstats max(_time) as last_occurance by ProcessName, component, hostname, Error". &amp;nbsp;After that, you can count error such combinations by day, then sort by last _occurrance:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| eventstats max(_time) as last_occurance by ProcessName,component,hostname,Error
| sort - last_occurance
| bin span=1d _time
| stats count by ProcessName, component, hostname, Error, last_occurance, _time
| sort - _time, last_occurance&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sample output looks like the following:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;ProcessName&lt;/TD&gt;&lt;TD&gt;component&lt;/TD&gt;&lt;TD&gt;hostname&lt;/TD&gt;&lt;TD&gt;Error&lt;/TD&gt;&lt;TD&gt;last_occurance&lt;/TD&gt;&lt;TD&gt;_time&lt;/TD&gt;&lt;TD&gt;count&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process1&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component1&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname2&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error1&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621963201&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-25&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;3&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process1&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component2&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname1&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error1&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621959601&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-25&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process1&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component2&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname2&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error1&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621956001&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-25&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process2&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component2&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname1&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error1&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621948801&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-25&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;3&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process1&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component1&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname1&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error2&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621945201&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-25&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process2&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component1&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname1&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error2&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621938001&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-25&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process2&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component2&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname1&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error2&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621930801&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-25&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process1&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component1&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname2&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error2&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621916401&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-25&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process2&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component2&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname2&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error1&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621912801&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-25&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process1&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component2&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname2&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error2&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621909201&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-25&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process2&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component1&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname1&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error1&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621902001&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-25&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process1&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component2&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname2&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error1&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621956001&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-24&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;3&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process2&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component2&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname1&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error1&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621948801&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-24&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;process1&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;component1&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;hostname1&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;error2&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;1621945201&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;2021-05-24&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="84.515625px" height="25px"&gt;...&lt;/TD&gt;&lt;TD width="103.9375px" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="92.984375px" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="56.28125px" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="107px" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="98.75px" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Hope this helps&lt;/P&gt;</description>
      <pubDate>Tue, 25 May 2021 18:23:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/553010#M156973</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2021-05-25T18:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/554560#M157399</link>
      <description>&lt;P&gt;Here is how my sample output looks like. I have Date and Time functionality split. So I want to sort by Date, Time and get a count in descending order starting with most recent error. So if I select 7 days, I need to look for the number of times the error occurred in past 7 days and arrange with recent error first. Similarly if I select past 24 hours need to get a count of&amp;nbsp; Errors for past 24 starting with recent error first.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sample Output:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="harry_123_0-1622845265406.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/14484i7BB3AABEFD292250/image-size/large?v=v2&amp;amp;px=999" role="button" title="harry_123_0-1622845265406.png" alt="harry_123_0-1622845265406.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Desired output&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="harry_123_2-1622845901407.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/14486i13A3AC58396EEC5E/image-size/large?v=v2&amp;amp;px=999" role="button" title="harry_123_2-1622845901407.png" alt="harry_123_2-1622845901407.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jun 2021 22:33:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/554560#M157399</guid>
      <dc:creator>harry_123</dc:creator>
      <dc:date>2021-06-04T22:33:04Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard to show count of unique alerts based on host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/554574#M157404</link>
      <description>&lt;LI-CODE lang="markup"&gt;| stats max(_time) as last_occurance count by ProcessName,component,hostname,Error
| sort - last_occurance&lt;/LI-CODE&gt;</description>
      <pubDate>Sat, 05 Jun 2021 05:33:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-to-show-count-of-unique-alerts-based-on-host/m-p/554574#M157404</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-06-05T05:33:58Z</dc:date>
    </item>
  </channel>
</rss>

