Hi there, hoping this is a quick question:
I've got a search which polls for several eventlog types, and I want to put them into a table by event type using number of hosts in each event type, rather than just the total of events per type.
Right now it looks something like:
(searchForA=A) (searchForB=B) (searchForC=C) (searchForD=D)
| eval EventType=case(
match(searchForA, "A"), "Results of A",
match(searchForB, "B"), "Results of B",
match(searchForC, "C"), "Results of C",
match(searchForD, "D"), "Results of D")
stats count by EventType
This shows me the counts of each event type no problem, and it works to show really big numbers, but what I'd like to show is a count of hosts per event type.... so like... | stats count by host PER EventType.
Any help would be great!
Do you mean
| stats dc(host) by EventType
or perhaps (showing the hosts, not counting)
| stats values(host) by EventType
Oh, and be careful with the vocabulary. In splunk's context, the "eventtype" word has some specific meaning so if you want to avoid misunderstandings, you can try to use another term.
Do you mean
| stats dc(host) by EventType
or perhaps (showing the hosts, not counting)
| stats values(host) by EventType
Oh, and be careful with the vocabulary. In splunk's context, the "eventtype" word has some specific meaning so if you want to avoid misunderstandings, you can try to use another term.
Pickle Riiiiick! Thanks!