<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to write a serach to list hosts sending data being indexed in Splunk for a specific sourcetype? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-a-serach-to-list-hosts-sending-data-being-indexed/m-p/199820#M57885</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I'm trying to build a search that lists the hosts daily that are, filtering for a specific SourceType, sending data being indexed in Splunk.&lt;BR /&gt;
Sort of a daily "Top Talkers" for a specific SourceType.&lt;/P&gt;

&lt;P&gt;Appreciated any help. &lt;/P&gt;</description>
    <pubDate>Sat, 29 Oct 2016 20:01:49 GMT</pubDate>
    <dc:creator>DomenicoFumarol</dc:creator>
    <dc:date>2016-10-29T20:01:49Z</dc:date>
    <item>
      <title>How to write a serach to list hosts sending data being indexed in Splunk for a specific sourcetype?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-a-serach-to-list-hosts-sending-data-being-indexed/m-p/199820#M57885</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I'm trying to build a search that lists the hosts daily that are, filtering for a specific SourceType, sending data being indexed in Splunk.&lt;BR /&gt;
Sort of a daily "Top Talkers" for a specific SourceType.&lt;/P&gt;

&lt;P&gt;Appreciated any help. &lt;/P&gt;</description>
      <pubDate>Sat, 29 Oct 2016 20:01:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-a-serach-to-list-hosts-sending-data-being-indexed/m-p/199820#M57885</guid>
      <dc:creator>DomenicoFumarol</dc:creator>
      <dc:date>2016-10-29T20:01:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to write a serach to list hosts sending data being indexed in Splunk for a specific sourcetype?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-a-serach-to-list-hosts-sending-data-being-indexed/m-p/199821#M57886</link>
      <description>&lt;P&gt;You can do this, which will run very quickly:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats count where index=* sourcetype=X by host
| sort 0 -count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you only want to see the top 10 or top 20, replace the zero in the sort command with the number of hosts you would like to see in the results. Note that this is counting the number of events, not the size of the events. So which this may be correlated with license usage, it will be not match. For information on license usage by sourcetype, take a look at the Distributed Monitoring Console (called just the Monitoring Console starting in Splunk 6.5)&lt;/P&gt;</description>
      <pubDate>Sun, 30 Oct 2016 06:44:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-a-serach-to-list-hosts-sending-data-being-indexed/m-p/199821#M57886</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2016-10-30T06:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to write a serach to list hosts sending data being indexed in Splunk for a specific sourcetype?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-a-serach-to-list-hosts-sending-data-being-indexed/m-p/199822#M57887</link>
      <description>&lt;P&gt;I guess you're trying to make a custom license dashboard?&lt;/P&gt;

&lt;P&gt;By default, there should be a search called &lt;CODE&gt;License Usage Data Cube&lt;/CODE&gt; in your search app. If not, it's this search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal source=*license_usage.log* type="Usage" | eval h=if(len(h)=0 OR isnull(h),"(SQUASHED)",h) | eval s=if(len(s)=0 OR isnull(s),"(SQUASHED)",s) | eval idx=if(len(idx)=0 OR isnull(idx),"(UNKNOWN)",idx) | bin _time span=1d | stats sum(b) as b by _time, pool, s, st, h, idx
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Accelerate that search using report acceleration and an appropriate time range, e.g. 30 days. Once the acceleration has completed, add the saved search to your dashboard as a base search and display your data with a postprocessing search something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| search st=$st$ | timechart span=1d sum(b) by h
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That's assuming &lt;CODE&gt;st&lt;/CODE&gt; is a token from a dropdown selecting the sourcetype to filter by.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Oct 2016 13:57:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-a-serach-to-list-hosts-sending-data-being-indexed/m-p/199822#M57887</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-10-30T13:57:46Z</dc:date>
    </item>
  </channel>
</rss>

