<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to write  queries for below condition ? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295456#M89151</link>
    <description>&lt;P&gt;I still don't understand what you're asking for query 2.    What are the two fields you want to trend on?  you said event=AuthAccept is a filter Or are you now saying event is a field that you want to trend on?&lt;/P&gt;</description>
    <pubDate>Wed, 28 Mar 2018 16:36:06 GMT</pubDate>
    <dc:creator>kmaron</dc:creator>
    <dc:date>2018-03-28T16:36:06Z</dc:date>
    <item>
      <title>How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295448#M89143</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
we have hosts a,b,c,d,e,f   hosts&lt;BR /&gt;
 looking for visualizations ?&lt;/P&gt;

&lt;P&gt;1)Trend count of all "filedname " per week for last 3 months?&lt;BR /&gt;
2)Trend of "filedname 2" 5 or 50 on a weekly basis with filters applied on event=AuthAccept&lt;/P&gt;

&lt;P&gt;Both the above have filters applied on the 6 servers listed above &lt;/P&gt;

&lt;P&gt;please help ?&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Splunker969&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 14:19:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295448#M89143</guid>
      <dc:creator>splunker969</dc:creator>
      <dc:date>2018-03-28T14:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295449#M89144</link>
      <description>&lt;P&gt;1)Trend count of all "filedname " per week for last 3 months?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;base search  earliest=-3month@month latest=now | timechart count(fieldname) by host span=1w
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;then visualize as a trellis split by host if you want individual graphs per host. &lt;/P&gt;

&lt;P&gt;The second one sounds the same as the first. Just add your filter to the base search. &lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 14:35:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295449#M89144</guid>
      <dc:creator>kmaron</dc:creator>
      <dc:date>2018-03-28T14:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295450#M89145</link>
      <description>&lt;P&gt;Thanks kmaron &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 15:06:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295450#M89145</guid>
      <dc:creator>splunker969</dc:creator>
      <dc:date>2018-03-28T15:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295451#M89146</link>
      <description>&lt;P&gt;Hi kmaron,&lt;/P&gt;

&lt;P&gt;base search  earliest=-3month@month latest=now | timechart count(fieldname) by host span=1w |search host=a OR host=b OR host=c OR host=d OR host=e the tail i added is not working can you hlep me .&lt;/P&gt;

&lt;P&gt;Also second query please &lt;BR /&gt;
Trend of "filedname 2" 5 or 50 on a weekly basis with filters applied on event=AuthAccept&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 15:21:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295451#M89146</guid>
      <dc:creator>splunker969</dc:creator>
      <dc:date>2018-03-28T15:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295452#M89147</link>
      <description>&lt;P&gt;your hosts, and any other filters, should be part of your base search &lt;/P&gt;

&lt;P&gt;something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=yourindex sourcetype=yoursourcetype (host=a OR host=b OR host=c OR host=d OR host=e) earliest=-3month@month latest=now | timechart count(fieldname) by host span=1w
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The second query sounds identical to the first query.  Just add your filter to the base search and change fieldname to fieldname2&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 15:26:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295452#M89147</guid>
      <dc:creator>kmaron</dc:creator>
      <dc:date>2018-03-28T15:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295453#M89148</link>
      <description>&lt;P&gt;query 2-It is having  two fileds filedname 2 for event=AuthAccept &lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 15:30:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295453#M89148</guid>
      <dc:creator>splunker969</dc:creator>
      <dc:date>2018-03-28T15:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295454#M89149</link>
      <description>&lt;P&gt;I don't understand.  are you saying you want a count of two different fields for all of the hosts over time? &lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 15:32:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295454#M89149</guid>
      <dc:creator>kmaron</dc:creator>
      <dc:date>2018-03-28T15:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295455#M89150</link>
      <description>&lt;P&gt;Query 1 it is only displaying per month not week .&lt;BR /&gt;
query 2 i am having  two fileds ie. filedname 2 needed for event=AuthAccept  (here event= AuthAccept is other filed )&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 16:03:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295455#M89150</guid>
      <dc:creator>splunker969</dc:creator>
      <dc:date>2018-03-28T16:03:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295456#M89151</link>
      <description>&lt;P&gt;I still don't understand what you're asking for query 2.    What are the two fields you want to trend on?  you said event=AuthAccept is a filter Or are you now saying event is a field that you want to trend on?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 16:36:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295456#M89151</guid>
      <dc:creator>kmaron</dc:creator>
      <dc:date>2018-03-28T16:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295457#M89152</link>
      <description>&lt;P&gt;no worries got it .Thanks &lt;/P&gt;

&lt;P&gt;index=yourindex sourcetype=yoursourcetype (host=a OR host=b OR host=c OR host=d OR host=e) earliest=-3month@month latest=now event=AuthAccept | timechart count(fieldname2) by host span=1w&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 16:54:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295457#M89152</guid>
      <dc:creator>splunker969</dc:creator>
      <dc:date>2018-03-28T16:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295458#M89153</link>
      <description>&lt;P&gt;Hi Kmaron ,&lt;/P&gt;

&lt;P&gt;sourcetype=* ( host="a" OR host="bOR host="c" OR host="d" OR host="e" OR host="f")  event=AuthAccept (authlevel=5 OR authlevel=50)&lt;BR /&gt;
 earliest=-1month@month latest=now | chart count(authlevel) by date_wday&lt;BR /&gt;
 when I search count of 5 and 50 are coming in one column can i separate the 5 column and 50 separate  c;columns in column chart .Any help .&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Splunker969&lt;/P&gt;</description>
      <pubDate>Thu, 29 Mar 2018 18:18:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295458#M89153</guid>
      <dc:creator>splunker969</dc:creator>
      <dc:date>2018-03-29T18:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295459#M89154</link>
      <description>&lt;P&gt;Try this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=* ( host="a" OR host="bOR host="c" OR host="d" OR host="e" OR host="f") event=AuthAccept (authlevel=5 OR authlevel=50)
earliest=-1month@month latest=now | chart count(authlevel) by date_wday, authlevel
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 29 Mar 2018 18:49:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295459#M89154</guid>
      <dc:creator>kmaron</dc:creator>
      <dc:date>2018-03-29T18:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295460#M89155</link>
      <description>&lt;P&gt;Hi kmaron thanks a lot It works .&lt;/P&gt;

&lt;P&gt;One more question -&lt;/P&gt;

&lt;P&gt;sourcetype=* ( host="a" OR host="bOR host="c" OR host="d" OR host="e" OR host="f") &lt;BR /&gt;
 earliest=-1month@month latest=now | chart count over agentName by  date_wday&lt;/P&gt;

&lt;P&gt;Can you help me with  distinct count of agentName on y axis and date_wday on x-axis and dates from date_wday legends on right .&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
splunker969&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 18:49:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295460#M89155</guid>
      <dc:creator>splunker969</dc:creator>
      <dc:date>2020-09-29T18:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295461#M89156</link>
      <description>&lt;P&gt;date_wday only gives you the day of the week.  What date are you saying you want as the legend?&lt;/P&gt;

&lt;P&gt;Chart commands are basically three pieces.  Your stats command which is your count, distinct count, etc. will build your Y axis.  Your X axis will be your Over field and the BY field is your legend. &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.0.3/SearchReference/Chart"&gt;http://docs.splunk.com/Documentation/Splunk/7.0.3/SearchReference/Chart&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Mar 2018 19:14:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295461#M89156</guid>
      <dc:creator>kmaron</dc:creator>
      <dc:date>2018-03-29T19:14:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295462#M89157</link>
      <description>&lt;P&gt;Hi kmaron ,&lt;/P&gt;

&lt;P&gt;yes your correct! Iam looking week kamron Iam looking for monday ,tuesdya,wed,th,friday,saturday,sunday legend .&lt;/P&gt;

&lt;P&gt;with distinct count of agentName on y axis and date_wday on x-axis and dates from date_wday legends on right .&lt;BR /&gt;
can you help me kmaron&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 18:49:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295462#M89157</guid>
      <dc:creator>splunker969</dc:creator>
      <dc:date>2020-09-29T18:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to write  queries for below condition ?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295463#M89158</link>
      <description>&lt;P&gt;sourcetype=* ( host="a" OR host="bOR host="c" OR host="d" OR host="e" OR host="f") &lt;BR /&gt;
earliest=-1month@month latest=now|stats dc(agentName) as count by date_wday&lt;/P&gt;

&lt;P&gt;serached this one but right side unable to display legend- monday ,tuesdya,wed,th,friday,saturday,sunday legend .Any help?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Mar 2018 21:52:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-queries-for-below-condition/m-p/295463#M89158</guid>
      <dc:creator>splunker969</dc:creator>
      <dc:date>2018-03-29T21:52:12Z</dc:date>
    </item>
  </channel>
</rss>

