<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to combine disparate log data into a single time chart? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113637#M29952</link>
    <description>&lt;P&gt;Apr 22 03:00:41 host.com sm-mta[10912]: s3M30dPD010912: Milter: to=&lt;A href="mailto:user@domain.com"&gt;user@domain.com&lt;/A&gt;, reject=550 5.1.1 User unknown&lt;/P&gt;

&lt;P&gt;Apr 22 03:01:19 host.com flow-control[16526]: something.com: selected class something.com [cloned from Moderate]&lt;/P&gt;

&lt;P&gt;(more coming)&lt;/P&gt;</description>
    <pubDate>Fri, 20 Jun 2014 17:04:26 GMT</pubDate>
    <dc:creator>dgillam</dc:creator>
    <dc:date>2014-06-20T17:04:26Z</dc:date>
    <item>
      <title>How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113634#M29949</link>
      <description>&lt;P&gt;I have mail processing log lines I need to combine and report on.  &lt;/P&gt;

&lt;P&gt;One type of log line contains strings like "cloned from Aggressive", "cloned from "Blocklist", etc.  &lt;/P&gt;

&lt;P&gt;Another type of log line contains a field "classification="  This field has values like "Zero-Hour", "Spam-Clean, Spam-Confirmed", "Passed", etc.  &lt;/P&gt;

&lt;P&gt;The various needed log lines do not share a common field name.&lt;/P&gt;

&lt;P&gt;I need a report that combines all these disparate data, to show a stacked column of all email, colored as to its classification and "cloned from" counts by time interval.  &lt;/P&gt;

&lt;P&gt;I can get a report on classifications, but it drops the other two types of data.  I can get a report on the other types of data (separately), but they drop the classification type, and so on.  &lt;/P&gt;

&lt;P&gt;How do I formulate the search/report to combine all these into a single chart?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 16:21:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113634#M29949</guid>
      <dc:creator>dgillam</dc:creator>
      <dc:date>2014-06-20T16:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113635#M29950</link>
      <description>&lt;P&gt;While there is no common field name, there must be some bit of common information across the lines of data that identify a single piece of email. Otherwise you'll have no way to do this.&lt;/P&gt;

&lt;P&gt;Or do you just want counts of two different things in one graph?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 16:39:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113635#M29950</guid>
      <dc:creator>aweitzman</dc:creator>
      <dc:date>2014-06-20T16:39:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113636#M29951</link>
      <description>&lt;P&gt;Do post some actual (anonymized) data from both sources.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 16:43:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113636#M29951</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2014-06-20T16:43:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113637#M29952</link>
      <description>&lt;P&gt;Apr 22 03:00:41 host.com sm-mta[10912]: s3M30dPD010912: Milter: to=&lt;A href="mailto:user@domain.com"&gt;user@domain.com&lt;/A&gt;, reject=550 5.1.1 User unknown&lt;/P&gt;

&lt;P&gt;Apr 22 03:01:19 host.com flow-control[16526]: something.com: selected class something.com [cloned from Moderate]&lt;/P&gt;

&lt;P&gt;(more coming)&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 17:04:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113637#M29952</guid>
      <dc:creator>dgillam</dc:creator>
      <dc:date>2014-06-20T17:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113638#M29953</link>
      <description>&lt;P&gt;Apr 22 03:03:31 host.com MM: [Jilter Processor 3 - Async Jilter Worker 37 - 127.0.0.1:40909-s3M33SSv011875] INFO  user.log  - AntiSpam.Log.Header.Debug: classification=Cloudmark, cloudmark_spam_score=100.00, cloudmark_content_score=100.00, cloudmark_ip_score=0.00, cloudmark_sender_score=0.00, cloudmark_analysis="v=2.1 cv=XMMJF2RE c=1 sm=1 tr=0 p=pKOSPnCJtLv9pbStFNYA:9 p=WthgjtGrYmcLPO50j_8A:9 a=XWQSJyLHRzquKgEqAPxMQA==:117 a=XWQSJyLHRzquKgEqAPxMQA==:17 a=aoWKRLlwSNoA:10 a=-N4dak_cAAAA:8 a=KGjhK52YXX0A:10 a=awlg0vDVAAAA:8 a=3fMtmCSMTM1j8r91:21 a=&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:53:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113638#M29953</guid>
      <dc:creator>dgillam</dc:creator>
      <dc:date>2020-09-28T16:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113639#M29954</link>
      <description>&lt;P&gt;I need to tally all of the above (count(reject), count("cloned from"), count(classification) by classification) all on the same chart, so we have something like:&lt;/P&gt;

&lt;P&gt;classification-1, classification-2, classification-3, classification-4, user-unknown, Bad-Reputation&lt;/P&gt;

&lt;P&gt;with their individual tallies, charted as a stacked column over time.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 17:07:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113639#M29954</guid>
      <dc:creator>dgillam</dc:creator>
      <dc:date>2014-06-20T17:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113640#M29955</link>
      <description>&lt;P&gt;So... an event in one log file doesn't have anything to do with an event from the other log file?&lt;/P&gt;

&lt;P&gt;Extract the reasons from the first file into a field called &lt;CODE&gt;classification&lt;/CODE&gt; and run this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=st1 OR sourcetype=st2 | timechart count by classification
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 20 Jun 2014 17:14:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113640#M29955</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2014-06-20T17:14:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113641#M29956</link>
      <description>&lt;P&gt;Thank you to all.  I believe I have a working solution to this:&lt;/P&gt;

&lt;P&gt;index=myindex AND classification=* | timechart count by classification&lt;BR /&gt;
| append [search index=myindex AND "cloned from" | timechart count AS Reputation]&lt;BR /&gt;
| append [search index=myindex AND "User unknown" | timechart count AS "User Unknown"]&lt;BR /&gt;
| append [search index=myindex AND "stat=Sent" | timechart count AS "Sent"]&lt;BR /&gt;
| sort _time&lt;/P&gt;

&lt;P&gt;Creating a stacked column (combined) chart from this gets me essentially what I need.  Each subsearch is a different column, but I can live with that, I think.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 18:15:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113641#M29956</guid>
      <dc:creator>dgillam</dc:creator>
      <dc:date>2014-06-20T18:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113642#M29957</link>
      <description>&lt;P&gt;all the data are the same sourcetype (mail log), but only one has a classification field, only one has "User unknown", only one has "cloned from".  Even though they are the same sourcetype, they have no intersecting filed names.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 18:18:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113642#M29957</guid>
      <dc:creator>dgillam</dc:creator>
      <dc:date>2014-06-20T18:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113643#M29958</link>
      <description>&lt;P&gt;I thought &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/172708"&gt;@martin_mueller&lt;/a&gt;'s answer was better generally, as it avoids subsearches, which is why I erased mine. But I'm glad this works too.&lt;/P&gt;

&lt;P&gt;If you want one combined column per time period, replace "| sort _time" with:&lt;/P&gt;

&lt;P&gt;| transaction _time | fields - linecount _raw closed_txn duration eventcount field_match_sum | sort _time&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:53:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113643#M29958</guid>
      <dc:creator>aweitzman</dc:creator>
      <dc:date>2020-09-28T16:53:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113644#M29959</link>
      <description>&lt;P&gt;If the field names don't match you can define field aliases or choose matching field names in your extractions or use &lt;CODE&gt;rename&lt;/CODE&gt; or &lt;CODE&gt;eval&lt;/CODE&gt; in the search to make the names match.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 18:23:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113644#M29959</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2014-06-20T18:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113645#M29960</link>
      <description>&lt;P&gt;same log file.  different email filtering components all log to the same log facility/file.  they each use different syntax in doing so.  I tried the route of eval and renaming fields, etc. but some components log in such a way that there essentially are no field names.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 19:16:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113645#M29960</guid>
      <dc:creator>dgillam</dc:creator>
      <dc:date>2014-06-20T19:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to combine disparate log data into a single time chart?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113646#M29961</link>
      <description>&lt;P&gt;You can still extract the fields. For example the cloned-from-logfile:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;\[(?&amp;lt;classification&amp;gt;cloned from \w+)\]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That way you get a &lt;CODE&gt;classification&lt;/CODE&gt; field in each source and hence can do a &lt;CODE&gt;count by classification&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 19:20:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-combine-disparate-log-data-into-a-single-time-chart/m-p/113646#M29961</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2014-06-20T19:20:11Z</dc:date>
    </item>
  </channel>
</rss>

