What are the searches required to search across Windows Event Logs for:
I realize this is an easy question, but it's one I heard from a Splunk user today and it didn't already have an entry in Answers...
This is really a basic search language issue, and might be better addressed in the http://docs.splunk.com/Documentation/Splunk/5.0/SearchReference/SearchCheatsheet or elsewhere in http://docs.splunk.com/Documentation/Splunk/5.0/SearchReference/WhatsInThisManual
Nevertheless:
sourcetype=WinEventLog:* EventCode=$myeventcode$ Source=$mysource$ | head 5sourcetype=WinEventLog:* EventCode=$myeventcode$ earliest=-1mon | timechart span=1d countsourcetype=WinEventLog:* EventCode=$myeventcode$ Source=$mysource$ | top limit=0 hostSeverity=Error | dedup 1 hostThe base search terms can of course be changed to suit the right WinEventLog, EventCode, Source, Severity, or other criteria. I'm pretty sure Severity isn't a field name, but I can't remember the right one.
This is really a basic search language issue, and might be better addressed in the http://docs.splunk.com/Documentation/Splunk/5.0/SearchReference/SearchCheatsheet or elsewhere in http://docs.splunk.com/Documentation/Splunk/5.0/SearchReference/WhatsInThisManual
Nevertheless:
sourcetype=WinEventLog:* EventCode=$myeventcode$ Source=$mysource$ | head 5sourcetype=WinEventLog:* EventCode=$myeventcode$ earliest=-1mon | timechart span=1d countsourcetype=WinEventLog:* EventCode=$myeventcode$ Source=$mysource$ | top limit=0 hostSeverity=Error | dedup 1 hostThe base search terms can of course be changed to suit the right WinEventLog, EventCode, Source, Severity, or other criteria. I'm pretty sure Severity isn't a field name, but I can't remember the right one.