Reporting

Check number of logs collected from source report

welkinson
Explorer

Hi I am a newbie here. Just wanted to ask how can I create a report of number of logs collected for all log source for a particular time frame?

Thanks a lot in advance!

Tags (1)
1 Solution

_d_
Splunk Employee
Splunk Employee

You can try something like this:

| metadata type=hosts | stats count by host

index=myindex | stats count by host

OR even this

| metadata type=hosts | where totalCount>0 | table host totalCount

Hope this helps.

> please upvote and accept answer if you find it useful - thanks!

View solution in original post

welkinson
Explorer

It shows a list for All time but when I try running it on a specific timeframe I get 0 events.

0 Karma

welkinson
Explorer

Thanks for your help. Actually I get the same number of totalcount if I select in the last 4, 7, 24 and 7 days.

0 Karma

_d_
Splunk Employee
Splunk Employee

That's probably because you dont have any events during that specific timeframe

0 Karma

_d_
Splunk Employee
Splunk Employee

You can try something like this:

| metadata type=hosts | stats count by host

index=myindex | stats count by host

OR even this

| metadata type=hosts | where totalCount>0 | table host totalCount

Hope this helps.

> please upvote and accept answer if you find it useful - thanks!

welkinson
Explorer

Hi thanks for the quick reply, how about instead of log sources I want to know which (top 10) hosts has the most number of logs for a particular time frame. Thanks!

0 Karma

_d_
Splunk Employee
Splunk Employee

Please upvote and accept answer - members of our community will find it useful.
Thanks!

0 Karma

_d_
Splunk Employee
Splunk Employee

Well, if you are only interested in the number of log sources in your splunk server then you can use the following (choose the timeframe using the time picker/dropdown):

| metadata type=sources | stats count by source

Alternatively, you can also use the following for a specific index:

index=myindex | stats count by source

If you are interested in the number of EVENTS for each of your sources, then this can help:

| metadata type=sources | where totalCount>0 | table source totalCount

Hope this helps.

> please upvote and accept answer if you find it useful - thanks!

0 Karma
Get Updates on the Splunk Community!

Dashboard Studio Challenge - Learn New Tricks, Showcase Your Skills, and Win Prizes!

Reimagine what you can do with your dashboards. Dashboard Studio is Splunk’s newest dashboard builder to ...

Introducing Edge Processor: Next Gen Data Transformation

We get it - not only can it take a lot of time, money and resources to get data into Splunk, but it also takes ...

Take the 2021 Splunk Career Survey for $50 in Amazon Cash

Help us learn about how Splunk has impacted your career by taking the 2021 Splunk Career Survey. Last year’s ...