Splunk Search

Conditional Filter count results in chart

dchodur
Path Finder
index=rhwindows sourcetype="WinEventLog:System" Type=Error OR Type=Warning NOT (*PrintSpooler OR *SpoolerWin32SPL) earliest=-24h@h latest=now | chart count over host by SourceName

Hopefully simple one:
Given the search above how do I only display counts that are greater then one for SourceName of a host.

Thanks.

Tags (1)
0 Karma

vyhmeister
New Member

I had a similar need, this worked for me:

...| stats count as Total by host, SourceName | search Total > 5 | chart last(Total) over host by SourceName

0 Karma

dchodur
Path Finder

Finally got back to this:

Found this post:
http://splunk-base.splunk.com/answers/56425/counting-distinct-field-values-and-dislaying-count-and-v...

Using this idea I did something like this.
| stats count by SourceName host | search count > 2 | table SourceName, host, count | sort -count

Not the way I really wanted it but it works.

0 Karma

dchodur
Path Finder

Sort of, I dont want any host where the count in any column of the columns is less then 2. A lot of these systems generate some one off events, I do not want to display those. I would assume if a host has a 28 in a column the others will still need to be zero or 1 because the host is listed.

If there was a better way to chart/table these I would be up for that. Maybe a multi listing or something.

Trying to make it easier to read and see issue spots.

0 Karma

bmacias84
Champion

@dchodur, did you try my new search in my answer using streamstats?

0 Karma

dchodur
Path Finder

Sort of, I dont want any host where the count in any column of the columns is less then 2. A lot of these systems generate some one off events, I do not want to display those. I would assume if a host has a 28 in a column the others will still need to be zero or 1 because the host is listed.

If there was a better way to chart/table these I would be up for that. Maybe a multi listing or something.

Trying to make it easier to read and see issue spots.

0 Karma

dchodur
Path Finder

Sort of, I dont want any host where the count in any column of the columns is less then 2. A lot of these systems generate some one off events, I do not want to display those. I would assume if a host has a 28 in a column the others will still need to be zero or 1 because the host is listed.

If there was a better way to chart/table these I would be up for that. Maybe a multi listing or something.

Trying to make it easier to read and see issue spots.

0 Karma

dchodur
Path Finder

Sort of, I dont want any host where the count in any column of the columns is less then 2. A lot of these systems generate some one off events, I do not want to display those. I would assume if a host has a 28 in a column the others will still need to be zero or 1 because the host is listed.

If there was a better way to chart/table these I would be up for that. Maybe a multi listing or something.

Trying to make it easier to read and see issue spots.

0 Karma

dchodur
Path Finder

Apprechiate the response still not acting like I want. Maybe an example best.

    host    DnsApi  Kerberos    Microsoft-Windows-GroupPolicy   Microsoft-Windows-Resource-Exhaustion-Detector  Microsoft-Windows-Service Control Manager   Microsoft-Windows-Time-Service  PlugPlayManager     Print   Service Control Manager Eventlog Provider   TermServDevices
1   CLAIMS  0   0   0   0   0   0   0   2   0   0
2   DIVSRV  0   0   0   0   0   6   0   0   0   0
3   MQVMa   0   0   0   0   0   0   226 0   0   0
4   MQVMb   0   0   0   0   0   0   0   0   0   1
5   PASSEXTN1   0   0   28  0   0   0   0   0   0   0
6   RHEDOC  0   0   0   0   0   0   0   0   0   1
7   VIPPsrv 1   0   0   0   0   7   0   0   0   0

I want to drop off systems like MQVMb, RHEDOC since they only have a count of one in any of the columns.

When I do the suggested way or anything where I seem to conditional count I loose systems lineMQVMa and the 226 or PASSEXTn1 28.

Sure I am just not building out the search correctly from the git go.

0 Karma

bmacias84
Champion

@dchodur,
I've added an update.

0 Karma

bmacias84
Champion

So you want to drop any host whos total sourceName count is less than 5?

0 Karma

bmacias84
Champion

I would use a where clause and stats. Keep in mind I am doing this off the cuff.


...|stats count by host, SourceName| where count>5 | chart count over host by SourceName

This may get you closer. Also might work better with subsearch.


...|stats count by host, SourceName| streamstats sum(count) as total_count by host |selfjoin host |where total_count>5 | chart count over host by SourceName

This should do what you want or give you an idea. Dont forget to accept and/or vote up anwser that help.

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...