<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerabilities per computer in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Vulnerabilities-per-computer/m-p/81755#M181874</link>
    <description>&lt;P&gt;You don't specify the results you are getting, but based on the search you're issuing it looks like the problem lies within the &lt;CODE&gt;dedup host&lt;/CODE&gt; directive. This will make Splunk include only one event per unique value for the &lt;CODE&gt;host&lt;/CODE&gt; field. Remove that part of your search and you should be good to go, i.e.:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=my_logs category=4 OR category=5 business=*My_business* | stats count by host as Vuln | sort -count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You can also use &lt;CODE&gt;top&lt;/CODE&gt; instead of &lt;CODE&gt;stats count&lt;/CODE&gt; which has the advantage that it also gives you how many percent each host contributes to the total number of vulnerabilities.&lt;/P&gt;</description>
    <pubDate>Thu, 14 Apr 2011 20:54:11 GMT</pubDate>
    <dc:creator>Ayn</dc:creator>
    <dc:date>2011-04-14T20:54:11Z</dc:date>
    <item>
      <title>Vulnerabilities per computer</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Vulnerabilities-per-computer/m-p/81754#M181873</link>
      <description>&lt;P&gt;hi, 
I am new to splunk and am trying to make a querry to give me all vulnerabilities of each computer in my domain. 
I have the following but it does not seem to work.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=my_logs category=4 OR category=5 business=*My_business* |dedup host | stats count(signature) by host as Vuln |sort -count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2011 20:31:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Vulnerabilities-per-computer/m-p/81754#M181873</guid>
      <dc:creator>TomCollick</dc:creator>
      <dc:date>2011-04-14T20:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities per computer</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Vulnerabilities-per-computer/m-p/81755#M181874</link>
      <description>&lt;P&gt;You don't specify the results you are getting, but based on the search you're issuing it looks like the problem lies within the &lt;CODE&gt;dedup host&lt;/CODE&gt; directive. This will make Splunk include only one event per unique value for the &lt;CODE&gt;host&lt;/CODE&gt; field. Remove that part of your search and you should be good to go, i.e.:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=my_logs category=4 OR category=5 business=*My_business* | stats count by host as Vuln | sort -count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You can also use &lt;CODE&gt;top&lt;/CODE&gt; instead of &lt;CODE&gt;stats count&lt;/CODE&gt; which has the advantage that it also gives you how many percent each host contributes to the total number of vulnerabilities.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2011 20:54:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Vulnerabilities-per-computer/m-p/81755#M181874</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2011-04-14T20:54:11Z</dc:date>
    </item>
  </channel>
</rss>

