The below query is giving the results for 30 days MaxTPS data. (Between the time range of 2:00 to 4:00)
index=<search_strings> earliest=-30d@d date_hour>=2 AND date_hour<4
| timechart s...
Hello, I have a static data about 200,000 rows (potentially grow) needs to be moved to a summary index daily. 1) Is it possible to move the data from DBXquery to summary index and re-write the d...
The events, each contain fieldA and fieldB (as well as other stuff). Currently, the search below works for 1 day, but I am trying to get a per day result for 30 days:
| top fieldB by f...
I am writing a search which I intend to use to create an alert from. I keep getting "No Results" from this search unless I remove the third line (where Percent.........). Something is wrong with t...
...he route of making a custom search command, but I would rather not if there's a sensible way of dealing with this within Splunk. 🙂
Update: woodcock asked for an example to better understand what I...
Hi, I am trying to create a alert for cpu usage by using below query, index=os host=cbtsv | stats latest(*) as * by host | table _time cpu_load_percent cpu_user_percent | eval CPU=cpu_load_per...
Hi I have a field, mode, which returns either returns data or is None (mode_true, mode_false). I'm trying to search and aggregate the sum [over time] of both outcomes over separately then p...
i am trying to think of a way to craft a search that will look for any hosts doing web-requests to the same site/url at regular the same intervals.
Basic idea is that Host A does a request to W...
I am looking to convert this regular search: index=foo action=blocked `macro` src_zone=foo | timechart count span=1d over to a search that leverage tstats and the Network Traffic datamodel that s...