<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to convert the SPL query into tstats in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/undefined/m-p/697994#M237084</link>
    <description>&lt;P&gt;I'm sure you are stuck, as expected.&lt;/P&gt;&lt;P&gt;The current &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; command produces only one field: count.&amp;nbsp; You can get some (and maybe all) of them using the &lt;FONT face="courier new,courier"&gt;list&lt;/FONT&gt; or &lt;FONT face="courier new,courier"&gt;values&lt;/FONT&gt; function, but any association between the fields will be lost.&lt;/P&gt;&lt;P&gt;For example,.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count, values(analysis.threat_score) as ats, values(analysis.metadata.sandcastle_env.analysis_start) as start, ... from datamodel=Cisco_Security.Secure_Malware_Analytics_Dataset where nodename=Secure_Malware_Analytics_Dataset index=* status IN ("*") sourcetype="cisco:sma:submissions"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 02 Sep 2024 15:33:33 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2024-09-02T15:33:33Z</dc:date>
    <item>
      <title>undefined</title>
      <link>https://community.splunk.com/t5/Splunk-Search/undefined/m-p/697900#M237048</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 09:04:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/undefined/m-p/697900#M237048</guid>
      <dc:creator>romanpro</dc:creator>
      <dc:date>2024-09-13T09:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: how to convert the SPL query into tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/undefined/m-p/697902#M237049</link>
      <description>&lt;P&gt;This query appears to be unsuitable for conversion to&amp;nbsp; &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt;.&amp;nbsp; It uses too many fields that must all be indexed for &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; to supply them.&amp;nbsp; Also, the query is doing its own analysis of the events, but &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; provides aggregated values, not events, which would break the calculations done in the query.&lt;/P&gt;&lt;P&gt;What problem are you trying to solve?&amp;nbsp; Perhaps &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; is not part of the answer.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Sep 2024 17:33:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/undefined/m-p/697902#M237049</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2024-09-01T17:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: how to convert the SPL query into tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/undefined/m-p/697910#M237054</link>
      <description>&lt;P&gt;I already converted up to this part&amp;nbsp;&lt;/P&gt;&lt;P&gt;| tstats count from datamodel=Cisco_Security.Secure_Malware_Analytics_Dataset where nodename=Secure_Malware_Analytics_Dataset index=* status IN ("*") sourcetype="cisco:sma:submissions"&lt;/P&gt;&lt;P&gt;It works as expected but I stuck to complete now&lt;/P&gt;</description>
      <pubDate>Sun, 01 Sep 2024 19:44:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/undefined/m-p/697910#M237054</guid>
      <dc:creator>romanpro</dc:creator>
      <dc:date>2024-09-01T19:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: how to convert the SPL query into tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/undefined/m-p/697994#M237084</link>
      <description>&lt;P&gt;I'm sure you are stuck, as expected.&lt;/P&gt;&lt;P&gt;The current &lt;FONT face="courier new,courier"&gt;tstats&lt;/FONT&gt; command produces only one field: count.&amp;nbsp; You can get some (and maybe all) of them using the &lt;FONT face="courier new,courier"&gt;list&lt;/FONT&gt; or &lt;FONT face="courier new,courier"&gt;values&lt;/FONT&gt; function, but any association between the fields will be lost.&lt;/P&gt;&lt;P&gt;For example,.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count, values(analysis.threat_score) as ats, values(analysis.metadata.sandcastle_env.analysis_start) as start, ... from datamodel=Cisco_Security.Secure_Malware_Analytics_Dataset where nodename=Secure_Malware_Analytics_Dataset index=* status IN ("*") sourcetype="cisco:sma:submissions"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 15:33:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/undefined/m-p/697994#M237084</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2024-09-02T15:33:33Z</dc:date>
    </item>
  </channel>
</rss>

