Splunk Search

How to cluster in subsearch based on EventCode results returned from main search?

jyim89
New Member

I essentially want to do something like this:

host="*mas*" sourcetype="WinEventLog:Application" AND (Type=Error OR Type=Warning) | foreach EventCode [ search host="*mas*" sourcetype="WinEventLog:Application" EventCode='<<FIELD>>' | cluster ]

However this an error saying "Error in 'foreach' command: Search pipeline may not contain non-streaming commands" It basically doesn't like the cluster command as part of the foreach.

To clarify, I want to cluster based on the EventCodes of the results returned from the initial search. I don't want to cluster on the whole of the initial search itself. Is there an easy way of doing this?

0 Karma

somesoni2
Revered Legend

Try this

host="*mas*" sourcetype="WinEventLog:Application" [search host="*mas*" sourcetype="WinEventLog:Application" AND (Type=Error OR Type=Warning) | stats count by EventCode | table EventCode] | cluster

The subsearch gets all the EventCodes with Type=Error OR Type=Warning and is passed to main search.

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...