<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to use top alongside with tstats in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/698996#M237320</link>
    <description>&lt;P&gt;Not sure why you are using prestats=true - try something like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count as Count from datamodel=Cisco_Security.Secure_Malware_Analytics_Dataset where index IN (add_on_builder_index, ba_test, cim_modactions, cisco_duo, cisco_etd, cisco_multicloud_defense, cisco_secure_fw, cisco_sfw_ftd_syslog, cisco_sma, cisco_sna, cisco_xdr, duo, encore, fw_syslog, history, ioc, main, mcd, mcd_syslog, notable, notable_summary, resource_usage_test_index, risk, secure_malware_analytics, sequenced_events, summary, threat_activity, ubaroute, ueba, whois) sourcetype="cisco:sma:submissions" Secure_Malware_Analytics_Dataset.status IN ("*") by Secure_Malware_Analytics_Dataset.analysis_behaviors_title
| eventstats sum(Count) as Total
| eval Percent=100*Count/Total
| sort - Count | head 20&lt;/LI-CODE&gt;</description>
    <pubDate>Fri, 13 Sep 2024 10:32:43 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2024-09-13T10:32:43Z</dc:date>
    <item>
      <title>how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/698984#M237317</link>
      <description>&lt;P&gt;how can I use top command after migrating to tstats? I need the same result, but looks like it can be done only using top, so I need it&lt;BR /&gt;&lt;BR /&gt;index IN (add_on_builder_index, ba_test, cim_modactions, cisco_duo, cisco_etd, cisco_multicloud_defense, cisco_secure_fw, cisco_sfw_ftd_syslog, cisco_sma, cisco_sna, cisco_xdr, duo, encore, fw_syslog, history, ioc, main, mcd, mcd_syslog, notable, notable_summary, resource_usage_test_index, risk, secure_malware_analytics, sequenced_events, summary, threat_activity, ubaroute, ueba, whois) sourcetype="cisco:sma:submissions" status IN ("*")&lt;BR /&gt;| rename analysis.threat_score AS ats&lt;BR /&gt;| where isnum(ats)&lt;BR /&gt;| eval ats_num=tonumber(ats)&lt;BR /&gt;| eval selected_ranges="*"&lt;BR /&gt;| eval token_score="*"&lt;BR /&gt;| eval within_selected_range=0&lt;BR /&gt;| rex field=selected_ranges "(?&amp;lt;start&amp;gt;\d+)-(?&amp;lt;end&amp;gt;\d+)"&lt;BR /&gt;| eval start=tonumber(start), end=tonumber(end)&lt;BR /&gt;| eval within_selected_range=if(&lt;BR /&gt;(ats_num &amp;gt;= start AND ats_num &amp;lt;= end) OR token_score="*",&lt;BR /&gt;1,&lt;BR /&gt;within_selected_range&lt;BR /&gt;)&lt;BR /&gt;| where within_selected_range=1&lt;BR /&gt;| rename "analysis.behaviors{}.title" as "Behavioral indicator"&lt;BR /&gt;| top limit=10 "Behavioral indicator"&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I tried this but it doesnt return me percent&lt;BR /&gt;&lt;BR /&gt;| tstats prestats=true count as Count from datamodel=Cisco_Security.Secure_Malware_Analytics_Dataset where index IN (add_on_builder_index, ba_test, cim_modactions, cisco_duo, cisco_etd, cisco_multicloud_defense, cisco_secure_fw, cisco_sfw_ftd_syslog, cisco_sma, cisco_sna, cisco_xdr, duo, encore, fw_syslog, history, ioc, main, mcd, mcd_syslog, notable, notable_summary, resource_usage_test_index, risk, secure_malware_analytics, sequenced_events, summary, threat_activity, ubaroute, ueba, whois) sourcetype="cisco:sma:submissions" Secure_Malware_Analytics_Dataset.status IN ("*") by Secure_Malware_Analytics_Dataset.analysis_behaviors_title&lt;BR /&gt;| chart count by Secure_Malware_Analytics_Dataset.analysis_behaviors_title&lt;BR /&gt;| sort - count | head 20&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 09:07:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/698984#M237317</guid>
      <dc:creator>romanpro</dc:creator>
      <dc:date>2024-09-13T09:07:35Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/698996#M237320</link>
      <description>&lt;P&gt;Not sure why you are using prestats=true - try something like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count as Count from datamodel=Cisco_Security.Secure_Malware_Analytics_Dataset where index IN (add_on_builder_index, ba_test, cim_modactions, cisco_duo, cisco_etd, cisco_multicloud_defense, cisco_secure_fw, cisco_sfw_ftd_syslog, cisco_sma, cisco_sna, cisco_xdr, duo, encore, fw_syslog, history, ioc, main, mcd, mcd_syslog, notable, notable_summary, resource_usage_test_index, risk, secure_malware_analytics, sequenced_events, summary, threat_activity, ubaroute, ueba, whois) sourcetype="cisco:sma:submissions" Secure_Malware_Analytics_Dataset.status IN ("*") by Secure_Malware_Analytics_Dataset.analysis_behaviors_title
| eventstats sum(Count) as Total
| eval Percent=100*Count/Total
| sort - Count | head 20&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 13 Sep 2024 10:32:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/698996#M237320</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-09-13T10:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699004#M237322</link>
      <description>&lt;P&gt;good try, but it skipped the list of the titles I have in my input query, I have a correct output of counts, but without titles&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 11:02:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699004#M237322</guid>
      <dc:creator>romanpro</dc:creator>
      <dc:date>2024-09-13T11:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699006#M237323</link>
      <description>&lt;P&gt;I don't know what this means, please can you show what you are getting and what you expected to get?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 11:10:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699006#M237323</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-09-13T11:10:15Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699008#M237325</link>
      <description>&lt;P&gt;here's what I get from my previous query, and what I expect to get&lt;/P&gt;&lt;P&gt;Environment Convicted Not Convicted&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Environment&lt;/TD&gt;&lt;TD&gt;convicted&lt;/TD&gt;&lt;TD&gt;not convicted&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;browser&lt;/TD&gt;&lt;TD&gt;8&lt;/TD&gt;&lt;TD&gt;12&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;win10&lt;/TD&gt;&lt;TD&gt;79&lt;/TD&gt;&lt;TD&gt;250&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;win10-x64-2-beta&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;TD&gt;117&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;win10-x64-browser&lt;/TD&gt;&lt;TD&gt;12&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;win7-x64&lt;/TD&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;832&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;here's what I get from the query you provided, I hope it helps&lt;/P&gt;&lt;P&gt;Secure_Malware_Analytics_Dataset.analysis_behaviors_title Count Percent Total&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Secure_Malware_Analytics_Dataset.analysis_behaviors_title&lt;/TD&gt;&lt;TD&gt;count&lt;/TD&gt;&lt;TD&gt;percent&lt;/TD&gt;&lt;TD&gt;total&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Executable Imported the IsDebuggerPresent Symbol&lt;/TD&gt;&lt;TD&gt;835&lt;/TD&gt;&lt;TD&gt;14.421416234887737&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PE Contains TLS Callback Entries&lt;/TD&gt;&lt;TD&gt;690&lt;/TD&gt;&lt;TD&gt;11.917098445595855&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Executable with Encrypted Sections&lt;/TD&gt;&lt;TD&gt;622&lt;/TD&gt;&lt;TD&gt;10.7426597582038&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Executable Artifact Imports Tool Help Functions&lt;/TD&gt;&lt;TD&gt;428&lt;/TD&gt;&lt;TD&gt;7.392055267702936&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PE Checksum is Invalid&lt;/TD&gt;&lt;TD&gt;403&lt;/TD&gt;&lt;TD&gt;6.960276338514681&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Artifact With Multiple Extensions Detected&lt;/TD&gt;&lt;TD&gt;364&lt;/TD&gt;&lt;TD&gt;6.286701208981002&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Executable Signed With Digital Certificate&lt;/TD&gt;&lt;TD&gt;277&lt;/TD&gt;&lt;TD&gt;4.784110535405873&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Process Modified File in a User Directory&lt;/TD&gt;&lt;TD&gt;250&lt;/TD&gt;&lt;TD&gt;4.317789291882556&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Executable Signing Date Invalid&lt;/TD&gt;&lt;TD&gt;220&lt;/TD&gt;&lt;TD&gt;3.7996545768566494&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Possible Registry Persistence Mechanism Detected&lt;/TD&gt;&lt;TD&gt;140&lt;/TD&gt;&lt;TD&gt;2.4179620034542313&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PE DOS Header Initial SP Value is Abnormal&lt;/TD&gt;&lt;TD&gt;138&lt;/TD&gt;&lt;TD&gt;2.383419689119171&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Static Analysis Flagged Artifact As Anomalous&lt;/TD&gt;&lt;TD&gt;86&lt;/TD&gt;&lt;TD&gt;1.4853195164075994&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Windows Crash Tool Execution Detected&lt;/TD&gt;&lt;TD&gt;85&lt;/TD&gt;&lt;TD&gt;1.468048359240069&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Artifact Flagged Malicious by Antivirus Service&lt;/TD&gt;&lt;TD&gt;81&lt;/TD&gt;&lt;TD&gt;1.3989637305699483&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;A Crash Dump File Was Created&lt;/TD&gt;&lt;TD&gt;77&lt;/TD&gt;&lt;TD&gt;1.3298791018998273&lt;/TD&gt;&lt;TD&gt;5790&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Fri, 13 Sep 2024 11:42:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699008#M237325</guid>
      <dc:creator>romanpro</dc:creator>
      <dc:date>2024-09-13T11:42:14Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699009#M237326</link>
      <description>&lt;P&gt;Is what you expected to get what you got from your non-tstats search?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 12:06:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699009#M237326</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-09-13T12:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699011#M237327</link>
      <description>&lt;P&gt;correct&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 12:16:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699011#M237327</guid>
      <dc:creator>romanpro</dc:creator>
      <dc:date>2024-09-13T12:16:47Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699033#M237333</link>
      <description>&lt;P&gt;So your conversion to tstats is not complete then? Using the data you get back from tstats is there sufficient information for you to compile the results you want (or do you need a different version of the tstats search?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 15:41:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699033#M237333</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-09-13T15:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699035#M237334</link>
      <description>&lt;P&gt;this is exactly why I'm here. My tstats query isn't completed, I need this data to be shown in logs as it used to be in my usual query (non-tstats one)&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 15:42:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699035#M237334</guid>
      <dc:creator>romanpro</dc:creator>
      <dc:date>2024-09-13T15:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699036#M237335</link>
      <description>&lt;P&gt;I need this query to use top command, but looks like it should be rewritten first in some kind of way&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 15:44:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699036#M237335</guid>
      <dc:creator>romanpro</dc:creator>
      <dc:date>2024-09-13T15:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699037#M237336</link>
      <description>&lt;P&gt;Without seeing your events it is difficult to determine what you need to do with the tstats to get the data you want.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 15:44:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699037#M237336</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-09-13T15:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699038#M237337</link>
      <description>&lt;P&gt;I thought showing my logs is enough with that in mind&amp;nbsp; I need the exact command to be there&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 15:45:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699038#M237337</guid>
      <dc:creator>romanpro</dc:creator>
      <dc:date>2024-09-13T15:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: how to use top alongside with tstats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699041#M237339</link>
      <description>&lt;P&gt;Where did you show your events?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 17:33:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-use-top-alongside-with-tstats/m-p/699041#M237339</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-09-13T17:33:11Z</dc:date>
    </item>
  </channel>
</rss>

