<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Frequency correlation between different sourcetypes in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138967#M38169</link>
    <description>&lt;P&gt;What is your end goal? Are you trying to compare counts, or are you trying to correlate each Alerts event with an ExceptionLog event? Why are you putting it into a bucket specifically rather than simply working with search results? (Not that using a bucket is bad, but I am just looking for your thought process and reasoning so we can help you more.)&lt;/P&gt;</description>
    <pubDate>Tue, 12 Nov 2013 17:34:09 GMT</pubDate>
    <dc:creator>jtrucks</dc:creator>
    <dc:date>2013-11-12T17:34:09Z</dc:date>
    <item>
      <title>Frequency correlation between different sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138966#M38168</link>
      <description>&lt;P&gt;I have two sourcetypes, one containing alerts from users that we have a problem, and another one with server logs. In a first stage, I would like to correlate the number of exceptions and the number of alerts received. I'm struggling with how to implement this, however. I tried starting from  &lt;CODE&gt;(sourcetype="Alerts") OR (sourcetype="ExceptionLog" level="Warning" OR level="Error") | bin _time span=3h&lt;/CODE&gt;. So, I would like to get the number of alerts in a bucket, and associate it with the number of exceptions in the same bucket, but how? I read &lt;A href="http://blogs.splunk.com/2012/10/01/simple-correlation-in-splunk"&gt;http://blogs.splunk.com/2012/10/01/simple-correlation-in-splunk&lt;/A&gt;, but didn't seem to work for my case.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Nov 2013 17:07:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138966#M38168</guid>
      <dc:creator>nl_cape</dc:creator>
      <dc:date>2013-11-12T17:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency correlation between different sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138967#M38169</link>
      <description>&lt;P&gt;What is your end goal? Are you trying to compare counts, or are you trying to correlate each Alerts event with an ExceptionLog event? Why are you putting it into a bucket specifically rather than simply working with search results? (Not that using a bucket is bad, but I am just looking for your thought process and reasoning so we can help you more.)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Nov 2013 17:34:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138967#M38169</guid>
      <dc:creator>jtrucks</dc:creator>
      <dc:date>2013-11-12T17:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency correlation between different sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138968#M38170</link>
      <description>&lt;P&gt;Try this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; (sourcetype="Alerts") OR (sourcetype="ExceptionLog" level="Warning" OR level="Error") 
| bucket _time span=1d
| stats count(eval(sourcetype="Alerts")) as Alerts count(eval(sourcetype="ExceptionLog")) as Exceptions by host _time
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;As @jtrucks pointed out, you didn't give any criteria for correlating the two sets of events, so I did it by host and day.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Nov 2013 19:16:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138968#M38170</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2013-11-12T19:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency correlation between different sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138969#M38171</link>
      <description>&lt;P&gt;Interesting, that is precisely what I tried. What happens is that I get no results from &lt;CODE&gt;count(sourcetype="AnySource")&lt;/CODE&gt;. I even tried &lt;CODE&gt;sourcetype!="Alerts")&lt;/CODE&gt;, and I still get a count of zero. Removing the &lt;CODE&gt;stats&lt;/CODE&gt; command, or removing the &lt;CODE&gt;sourcetype&lt;/CODE&gt;, works as expected.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2013 07:47:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138969#M38171</guid>
      <dc:creator>nl_cape</dc:creator>
      <dc:date>2013-11-13T07:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency correlation between different sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138970#M38172</link>
      <description>&lt;P&gt;@jtrucks: The first idea is to explore if there is a correlation between user alerts and exceptions we log. I'd like to do a scatter plot of this over time, which should hopefully make this somewhat clear.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2013 07:48:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138970#M38172</guid>
      <dc:creator>nl_cape</dc:creator>
      <dc:date>2013-11-13T07:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency correlation between different sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138971#M38173</link>
      <description>&lt;P&gt;Ah. Changing it to &lt;CODE&gt;count(eval(sourcetype="Alerts"))&lt;/CODE&gt; makes it work. As is clearly written in the docs. Whoops.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2013 08:03:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138971#M38173</guid>
      <dc:creator>nl_cape</dc:creator>
      <dc:date>2013-11-13T08:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency correlation between different sourcetypes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138972#M38174</link>
      <description>&lt;P&gt;Aww, raspberry to me! I will fix the answer - thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2013 05:57:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Frequency-correlation-between-different-sourcetypes/m-p/138972#M38174</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2013-11-14T05:57:31Z</dc:date>
    </item>
  </channel>
</rss>

