Reporting

Check number of logs collected from source report

welkinson
Explorer

Hi I am a newbie here. Just wanted to ask how can I create a report of number of logs collected for all log source for a particular time frame?

Thanks a lot in advance!

Tags (1)
1 Solution

_d_
Splunk Employee
Splunk Employee

You can try something like this:

| metadata type=hosts | stats count by host

index=myindex | stats count by host

OR even this

| metadata type=hosts | where totalCount>0 | table host totalCount

Hope this helps.

> please upvote and accept answer if you find it useful - thanks!

View solution in original post

welkinson
Explorer

It shows a list for All time but when I try running it on a specific timeframe I get 0 events.

0 Karma

welkinson
Explorer

Thanks for your help. Actually I get the same number of totalcount if I select in the last 4, 7, 24 and 7 days.

0 Karma

_d_
Splunk Employee
Splunk Employee

That's probably because you dont have any events during that specific timeframe

0 Karma

_d_
Splunk Employee
Splunk Employee

You can try something like this:

| metadata type=hosts | stats count by host

index=myindex | stats count by host

OR even this

| metadata type=hosts | where totalCount>0 | table host totalCount

Hope this helps.

> please upvote and accept answer if you find it useful - thanks!

welkinson
Explorer

Hi thanks for the quick reply, how about instead of log sources I want to know which (top 10) hosts has the most number of logs for a particular time frame. Thanks!

0 Karma

_d_
Splunk Employee
Splunk Employee

Please upvote and accept answer - members of our community will find it useful.
Thanks!

0 Karma

_d_
Splunk Employee
Splunk Employee

Well, if you are only interested in the number of log sources in your splunk server then you can use the following (choose the timeframe using the time picker/dropdown):

| metadata type=sources | stats count by source

Alternatively, you can also use the following for a specific index:

index=myindex | stats count by source

If you are interested in the number of EVENTS for each of your sources, then this can help:

| metadata type=sources | where totalCount>0 | table source totalCount

Hope this helps.

> please upvote and accept answer if you find it useful - thanks!

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...