<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic filtering for events occurring seconds before and after a given windows eventID in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/filtering-for-events-occurring-seconds-before-and-after-a-given/m-p/72661#M180977</link>
    <description>&lt;P&gt;I would like to filter for events that occurred immediately before and after a given windows eventID. For example, if Windows Eventid 1234 occurs every so often, how can I create a filter, or grouping or transaction consisting of just the event with that eventID plus the 2 or 3 event before and after it?&lt;/P&gt;</description>
    <pubDate>Fri, 09 Sep 2011 18:36:30 GMT</pubDate>
    <dc:creator>mikefoti</dc:creator>
    <dc:date>2011-09-09T18:36:30Z</dc:date>
    <item>
      <title>filtering for events occurring seconds before and after a given windows eventID</title>
      <link>https://community.splunk.com/t5/Splunk-Search/filtering-for-events-occurring-seconds-before-and-after-a-given/m-p/72661#M180977</link>
      <description>&lt;P&gt;I would like to filter for events that occurred immediately before and after a given windows eventID. For example, if Windows Eventid 1234 occurs every so often, how can I create a filter, or grouping or transaction consisting of just the event with that eventID plus the 2 or 3 event before and after it?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2011 18:36:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/filtering-for-events-occurring-seconds-before-and-after-a-given/m-p/72661#M180977</guid>
      <dc:creator>mikefoti</dc:creator>
      <dc:date>2011-09-09T18:36:30Z</dc:date>
    </item>
    <item>
      <title>Re: filtering for events occurring seconds before and after a given windows eventID</title>
      <link>https://community.splunk.com/t5/Splunk-Search/filtering-for-events-occurring-seconds-before-and-after-a-given/m-p/72662#M180978</link>
      <description>&lt;P&gt;I may be getting close... but would very much appreciate feedback... am I on the right track?&lt;/P&gt;

&lt;P&gt;For now my goal has been scaled back to discovering what events occurred on servers 1, 2 &amp;amp; 3 at the same time as the event with eventID=15223. Later I will want to improve this to find events occurring within 1 second of this event.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;host="server1" OR host="server2" OR host="server3" [search host="server1" OR host="server2" OR host="server3" winEventVwrEventID="15223" | fields + winEventVwrEventTIME]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 09 Sep 2011 20:03:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/filtering-for-events-occurring-seconds-before-and-after-a-given/m-p/72662#M180978</guid>
      <dc:creator>mikefoti</dc:creator>
      <dc:date>2011-09-09T20:03:35Z</dc:date>
    </item>
  </channel>
</rss>

