Getting Data In

How to create this search?

NanSplk01
Communicator

I need to create a search (or an embedded search that feeds data to another search.  What I'm trying to get is a search like  |tstats values(host) where index=* by index which might feed to a spread sheet that has server and host and then another search on top of it to match up host with index. (NOT indexers)

|tstats values(host) where index=* by index
Labels (2)
0 Karma
1 Solution

NanSplk01
Communicator

Thank you, used part of this with a search, but had to get some assistance.  The final search looked a little like this--did not use two searches, just one:

index=_internal source=*metrics.log group=tcpin_connections
| eval sourceHost=lower(if(isnull(hostname), sourceHost,hostname))
| rename connectionType as connectType
| eval connectType=case(fwdType=="uf","univ fwder", fwdType=="lwf", "lightwt fwder",fwdType=="full", "heavy fwder", connectType=="cooked" or connectType=="cookedSSL","Splunk fwder", connectType=="raw" or connectType=="rawSSL","legacy fwder")
| eval version=if(isnull(version),"pre 4.2",version)
| join sourceHost
[|tstats values(host) where index=* NOT index=*** NOT index=***| rename values(host) as host
| mvexpand host
| dedup host index
| eval sourceHost= lower(host)
| fields - host]
| dedup sourceHost connectType version
| table sourceHost connectType version
| sort index

 

Hopes this helps anyone else who needs to combine information from two searches.

View solution in original post

0 Karma

nyc_jason
Splunk Employee
Splunk Employee

Hello, so are you looking to output a table of host and index to show what hosts are in each index? If so, try this: |tstats count where index=* by host index|fields - count

0 Karma

NanSplk01
Communicator

Thank you, used part of this with a search, but had to get some assistance.  The final search looked a little like this--did not use two searches, just one:

index=_internal source=*metrics.log group=tcpin_connections
| eval sourceHost=lower(if(isnull(hostname), sourceHost,hostname))
| rename connectionType as connectType
| eval connectType=case(fwdType=="uf","univ fwder", fwdType=="lwf", "lightwt fwder",fwdType=="full", "heavy fwder", connectType=="cooked" or connectType=="cookedSSL","Splunk fwder", connectType=="raw" or connectType=="rawSSL","legacy fwder")
| eval version=if(isnull(version),"pre 4.2",version)
| join sourceHost
[|tstats values(host) where index=* NOT index=*** NOT index=***| rename values(host) as host
| mvexpand host
| dedup host index
| eval sourceHost= lower(host)
| fields - host]
| dedup sourceHost connectType version
| table sourceHost connectType version
| sort index

 

Hopes this helps anyone else who needs to combine information from two searches.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Maximizing the Value of Splunk ES 8.x

Splunk Enterprise Security (ES) continues to be a leader in the Gartner Magic Quadrant, reflecting its pivotal ...