<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: eval and &amp;quot;|search&amp;quot; question in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29253#M5875</link>
    <description>&lt;P&gt;no it's from  a stats pipe I''l add that part of the search.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Aug 2013 17:10:34 GMT</pubDate>
    <dc:creator>cpeteman</dc:creator>
    <dc:date>2013-08-08T17:10:34Z</dc:date>
    <item>
      <title>eval and "|search" question</title>
      <link>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29251#M5873</link>
      <description>&lt;P&gt;So I have a search that runs over a 4h time span that Only gives results when the number of event of one kind are as manhy as or more than the number of hours. I want to be able to run over any timespan:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    search terms earliest=-4h latest=now() | ... |  stats count by _raw,TimeInHour,punct| 
 addinfo| eval hours = round((info_max_time - info_min_time)/3600,0) | search count &amp;gt; 3
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;the search should look for results that have a count equal to the number of hours I searched over but if I write &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;   search terms earliest=-4h latest=now() | ... |  stats count by _raw,TimeInHour,punct  |addinfo
| eval hours = round((info_max_time - info_min_time)/3600,0) | search count &amp;gt; hours-1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I get no results. Are count and hours not something I can compare, how do I change that?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2013 15:56:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29251#M5873</guid>
      <dc:creator>cpeteman</dc:creator>
      <dc:date>2013-08-08T15:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: eval and "|search" question</title>
      <link>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29252#M5874</link>
      <description>&lt;P&gt;Is count a field in the event?&lt;/P&gt;

&lt;P&gt;and why do u use search count &amp;gt; hours-1? why not where count &amp;gt; hours-1. And rather than round could you use "floor"?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2013 17:09:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29252#M5874</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2013-08-08T17:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: eval and "|search" question</title>
      <link>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29253#M5875</link>
      <description>&lt;P&gt;no it's from  a stats pipe I''l add that part of the search.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2013 17:10:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29253#M5875</guid>
      <dc:creator>cpeteman</dc:creator>
      <dc:date>2013-08-08T17:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: eval and "|search" question</title>
      <link>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29254#M5876</link>
      <description>&lt;P&gt;It depends on how you're getting 'count'... Maybe this search will work for you?&lt;/P&gt;

&lt;P&gt;search terms earliest=-4h | eventstats count | addinfo | eval hours = round((info_max_time - info_min_time)/3600,0) | where count &amp;gt; hours&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:31:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29254#M5876</guid>
      <dc:creator>emechler_splunk</dc:creator>
      <dc:date>2020-09-28T14:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: eval and "|search" question</title>
      <link>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29255#M5877</link>
      <description>&lt;P&gt;changing search to where was all it took. Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2013 17:16:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29255#M5877</guid>
      <dc:creator>cpeteman</dc:creator>
      <dc:date>2013-08-08T17:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: eval and "|search" question</title>
      <link>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29256#M5878</link>
      <description>&lt;P&gt;rename count "AS" something else and then use that something else to compare.&lt;/P&gt;

&lt;P&gt;...|stats count AS foobar by _time |where foobar&amp;gt;25&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2013 17:37:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/eval-and-quot-search-quot-question/m-p/29256#M5878</guid>
      <dc:creator>davecroto</dc:creator>
      <dc:date>2013-08-08T17:37:46Z</dc:date>
    </item>
  </channel>
</rss>

