<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Advanced Search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21798#M3633</link>
    <description>&lt;P&gt;Note the field in the sum() should be "cvp" underscore "reserved" underscore "count".&lt;/P&gt;</description>
    <pubDate>Thu, 24 Nov 2011 13:30:25 GMT</pubDate>
    <dc:creator>eelisio2</dc:creator>
    <dc:date>2011-11-24T13:30:25Z</dc:date>
    <item>
      <title>Advanced Search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21791#M3626</link>
      <description>&lt;P&gt;I have a top ten search fpor windows Errors that I run each day.&lt;/P&gt;

&lt;P&gt;My bose want to to know how many days each of the top ten have been on the top ten list&lt;/P&gt;

&lt;P&gt;The report should look like this:&lt;/P&gt;

&lt;P&gt;Event_ID | Num_Days_On_List | Count&lt;/P&gt;

&lt;P&gt;256 | 5 | 256&lt;/P&gt;

&lt;P&gt;1056 | 1 | 194&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2011 21:35:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21791#M3626</guid>
      <dc:creator>hartfoml</dc:creator>
      <dc:date>2011-11-23T21:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21792#M3627</link>
      <description>&lt;P&gt;This isn't exactly what you want, but i think it will get you close enough. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;yoursearch | bucket _time span=1d as day | eval day=strftime(day, "%Y-%m-%d") | chart count over Event_ID by day
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This should produce a nice table with the dates on the top. Then you can sort the counts by day by clicking on them. Run this search over a timeframe of at least 24 hours or greater. My security analysts love this search for security related events. &lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2011 22:11:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21792#M3627</guid>
      <dc:creator>RicoSuave</dc:creator>
      <dc:date>2011-11-23T22:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21793#M3628</link>
      <description>&lt;P&gt;OH Ya this is good stuff.  I like it but it is not realy what I'm lloking for here.  I will be sure to keep this jem for later.  Thanks much this is a great peace of code.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2011 22:26:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21793#M3628</guid>
      <dc:creator>hartfoml</dc:creator>
      <dc:date>2011-11-23T22:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21794#M3629</link>
      <description>&lt;P&gt;Matt,&lt;/P&gt;

&lt;P&gt;Thanks for asking&lt;/P&gt;

&lt;P&gt;I use something like this to get a tale with host ahd event ID for one day&lt;/P&gt;

&lt;P&gt;"source="WinEventLog:*" Type="Error" | top host event_id | Table host event_id count"&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2011 22:30:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21794#M3629</guid>
      <dc:creator>hartfoml</dc:creator>
      <dc:date>2011-11-23T22:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21795#M3630</link>
      <description>&lt;P&gt;I might have to put the results in a summary and then go back and get the count of days on the list from there or in a lookup table but I have never done that before.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2011 22:34:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21795#M3630</guid>
      <dc:creator>hartfoml</dc:creator>
      <dc:date>2011-11-23T22:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21796#M3631</link>
      <description>&lt;P&gt;I think Summary Indexing would work for this.&lt;/P&gt;

&lt;P&gt;Create a new index for your summary (e.g., summarytopstatus).&lt;/P&gt;

&lt;P&gt;Create search to use the sitop command instead of top.&lt;BR /&gt;
(sourcetype="yoursourcetype" | sitop Event_ID)   with a relative timeframe of -1d@d&lt;/P&gt;

&lt;P&gt;Edit the search to have it run on a scheduled basis. (every day at midnight)&lt;BR /&gt;&lt;BR /&gt;
Check 'Enable Summary Indexing'.&lt;BR /&gt;
Select your new index.&lt;/P&gt;

&lt;P&gt;The following should give your the results you are looking for:&lt;/P&gt;

&lt;P&gt;index="summarytopstatus" search_name="yoursearchname" | stats count as Num_Days_On_List , sum(cvp*&lt;EM&gt;reserved&lt;/EM&gt;*count) as TotalCount by Event_ID&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 10:08:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21796#M3631</guid>
      <dc:creator>eelisio2</dc:creator>
      <dc:date>2020-09-28T10:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21797#M3632</link>
      <description>&lt;P&gt;Will this be run once a day? - Scheduled?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2011 11:57:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21797#M3632</guid>
      <dc:creator>MHibbin</dc:creator>
      <dc:date>2011-11-24T11:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21798#M3633</link>
      <description>&lt;P&gt;Note the field in the sum() should be "cvp" underscore "reserved" underscore "count".&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2011 13:30:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21798#M3633</guid>
      <dc:creator>eelisio2</dc:creator>
      <dc:date>2011-11-24T13:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21799#M3634</link>
      <description>&lt;P&gt;Yes I will start with once a day as the operations team meets every morning to disuse direction and progress&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2011 14:23:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Advanced-Search/m-p/21799#M3634</guid>
      <dc:creator>hartfoml</dc:creator>
      <dc:date>2011-11-28T14:23:44Z</dc:date>
    </item>
  </channel>
</rss>

