<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Top errors with hosts in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Top-errors-with-hosts/m-p/32667#M6855</link>
    <description>&lt;P&gt;I have a search that sends me the top 10 errors on all of our servers each morning:&lt;/P&gt;

&lt;P&gt;error OR Error OR alert OR Alert OR fail* OR Fail* source="WMI:WinEventLog*" | top limit=10 Message&lt;/P&gt;

&lt;P&gt;But this would be much more helpful if I could, for each error, see which server(s) it has occurred on.&lt;/P&gt;

&lt;P&gt;I assume I need to run a subsearch to figure out which server(s) the error has ocurred?&lt;/P&gt;</description>
    <pubDate>Wed, 22 Jun 2011 14:44:17 GMT</pubDate>
    <dc:creator>jamesklassen</dc:creator>
    <dc:date>2011-06-22T14:44:17Z</dc:date>
    <item>
      <title>Top errors with hosts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Top-errors-with-hosts/m-p/32667#M6855</link>
      <description>&lt;P&gt;I have a search that sends me the top 10 errors on all of our servers each morning:&lt;/P&gt;

&lt;P&gt;error OR Error OR alert OR Alert OR fail* OR Fail* source="WMI:WinEventLog*" | top limit=10 Message&lt;/P&gt;

&lt;P&gt;But this would be much more helpful if I could, for each error, see which server(s) it has occurred on.&lt;/P&gt;

&lt;P&gt;I assume I need to run a subsearch to figure out which server(s) the error has ocurred?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2011 14:44:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Top-errors-with-hosts/m-p/32667#M6855</guid>
      <dc:creator>jamesklassen</dc:creator>
      <dc:date>2011-06-22T14:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: Top errors with hosts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Top-errors-with-hosts/m-p/32668#M6856</link>
      <description>&lt;P&gt;Using a subsearch is overkill -- use &lt;CODE&gt;stats&lt;/CODE&gt; instead. Something like the following should work.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;error OR alert OR fail source="WMI:WinEventLog*"
| stats count values(host) by Message
| sort - count
| head 10
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 22 Jun 2011 14:52:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Top-errors-with-hosts/m-p/32668#M6856</guid>
      <dc:creator>southeringtonp</dc:creator>
      <dc:date>2011-06-22T14:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: Top errors with hosts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Top-errors-with-hosts/m-p/32669#M6857</link>
      <description>&lt;P&gt;Perfect, thank you&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2011 16:03:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Top-errors-with-hosts/m-p/32669#M6857</guid>
      <dc:creator>jamesklassen</dc:creator>
      <dc:date>2011-06-22T16:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: Top errors with hosts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Top-errors-with-hosts/m-p/32670#M6858</link>
      <description>&lt;P&gt;Unless I'm mistaken, the strings you're searching for are case-insensitive.  In fact, I had asked this a while back, but I don't think you can have Splunk do a case-sensitive search.  So in your case, you really only need&lt;/P&gt;

&lt;P&gt;error OR alert OR fail ...&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2011 19:28:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Top-errors-with-hosts/m-p/32670#M6858</guid>
      <dc:creator>mfrost8</dc:creator>
      <dc:date>2011-06-23T19:28:55Z</dc:date>
    </item>
  </channel>
</rss>

