I have a summary index that contains the following information for my Windows event logs: host, sourcetype, and count. I want to group the records so that when they are displayed they show like this:
datetime hostname sourcetype count
-------- -------- ------------------------- -----
10/27/10 9:00 am hostname WinEventLog:Application 9
WinEventLog:Security 17034
WinEventLog:System 3
My search looks like:
index="winos_event_summary" | transaction orig_host maxpause=59m | table _time,orig_host,orig_sourcetype,count
This shows the following table
10/27/10 9:00 am hostname WinEventLog:Application 17034
WinEventLog:Security 3
WinEventLog:System 9
The count field isn't being put with the proper host/sourcetype combination. When I take out the transaction statement I get:
10/27/10 9:00 am hostname WinEventLog:Application 9
10/27/10 9:00 am hostname WinEventLog:Security 17034
10/27/10 9:00 am hostname WinEventLog:System 3
Why does the transaction statement move the count and associate it with the wrong host/sourcetype? The count field is part of the summary record.
Thanks.
... View more