Splunk Search

logical grouping of hosts - aggregate stats

desertpilotjc
Explorer

I have a situation where I want to report on events from 2 sets of servers where i can compare the aggregate counts. I want all the results grouped into 2 tallies. In other words...

  • 10 total servers
  • 7 servers in Group A
  • 3 servers in Group B

I want to do some timechart and other stats reports that have the tallies for the events labeled / displayed as Group A and Group B - not all the individual servers as would be the case with the "host=xxxxx"scenario. Can this be done?

TIA!

Tags (1)
0 Karma

alterdego
Path Finder
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...