<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to find missing values from a search events compared to a list - (either a lookup file or a declared values) in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-find-missing-values-from-a-search-events-compared-to-a/m-p/310588#M93157</link>
    <description>&lt;P&gt;@hulgundi, if this worked for you, please click &lt;CODE&gt;Accept&lt;/CODE&gt; to close the question and help others find valid solutions more easily.&lt;/P&gt;</description>
    <pubDate>Thu, 28 Jun 2018 16:13:37 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2018-06-28T16:13:37Z</dc:date>
    <item>
      <title>How to find missing values from a search events compared to a list - (either a lookup file or a declared values)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-find-missing-values-from-a-search-events-compared-to-a/m-p/310586#M93155</link>
      <description>&lt;P&gt;I need to find the missing list of process  from a list of hosts and setup an alert&lt;/P&gt;

&lt;P&gt;There will be number of process  ~ 16 process to be monitored  on number of hosts.&lt;/P&gt;

&lt;P&gt;I need some help in evaluating which process is missing&lt;BR /&gt;
I can take lookup file approach but would like to  do a search and eval with out using a lookup.&lt;/P&gt;

&lt;P&gt;I tried this way &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;earliest=-10m@m (index=os* OR index=matrix_os) source=ps host=abc* |rex field=COMMAND "somename\/(?[^\/]*)/httpd/sbin/httpd"  |stats count by inst host |eval mylist="inst0,inst1,test1,test2" |eval procname=split(mylist,",")|mvexpand procname|eval is_running=if(match(procname, inst),1,0)|table is_running host inst count procname
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This lists out all matching and non matching . I want to just list out where procname=test1 on host which is not found.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 19:26:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-find-missing-values-from-a-search-events-compared-to-a/m-p/310586#M93155</guid>
      <dc:creator>hulgundi</dc:creator>
      <dc:date>2017-08-30T19:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to find missing values from a search events compared to a list - (either a lookup file or a declared values)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-find-missing-values-from-a-search-events-compared-to-a/m-p/310587#M93156</link>
      <description>&lt;P&gt;Do it like this (will need adjustment; this is run-anywhere):&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_* 
| append  [| makeresults 
    | fields - _time 
    | rename COMMENT1of2 AS "All real events will have a 'host' value, but these 'sentinel' events will not"
    | rename COMMENT2of2 AS "This section would best be done as a 'lookup' using '|inputlookup append=t' instead of '|makeresults'."
    | eval sourcetype="audittrail kvstore mongod scheduler splunk_disk_objects splunk_python splunk_resource_usage splunk_web_access splunk_web_service splunkd splunkd_access splunkd_ui_access ta_snow ta_snow_util this_will_never_have_data" 
    | makemv sourcetype] 
| stats count(host) AS count BY sourcetype
| eval is_running=if((count&amp;gt;0), 1, 0)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 30 Aug 2017 22:56:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-find-missing-values-from-a-search-events-compared-to-a/m-p/310587#M93156</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-08-30T22:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to find missing values from a search events compared to a list - (either a lookup file or a declared values)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-find-missing-values-from-a-search-events-compared-to-a/m-p/310588#M93157</link>
      <description>&lt;P&gt;@hulgundi, if this worked for you, please click &lt;CODE&gt;Accept&lt;/CODE&gt; to close the question and help others find valid solutions more easily.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jun 2018 16:13:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-find-missing-values-from-a-search-events-compared-to-a/m-p/310588#M93157</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2018-06-28T16:13:37Z</dc:date>
    </item>
  </channel>
</rss>

