Activity Feed
- Karma Re: Grab only last X number of values from a transaction for kristian_kolb. 06-05-2020 12:46 AM
- Karma Re: Filtering values from a JSON file for bboe. 06-05-2020 12:46 AM
- Karma Re: incorrect host names for stefandagerman. 06-05-2020 12:46 AM
- Karma Re: Timechart "OTHER" category for martin_mueller. 06-05-2020 12:46 AM
- Karma Re: UI Example advanced_intro2 XML for vincesesto. 06-05-2020 12:46 AM
- Karma Re: chart overlay with sideview util ? for sideview. 06-05-2020 12:46 AM
- Karma Re: Sideview Util - Search is running before selection is complete for sideview. 06-05-2020 12:46 AM
- Karma Re: Transaction by time range and calculate for cramasta. 06-05-2020 12:46 AM
- Karma Re: whitelist two different sourcetype under same monitoring path for martin_mueller. 06-05-2020 12:46 AM
- Karma Re: variable where clause for sideview. 06-05-2020 12:46 AM
- Karma Re: difference of two counts for sdaniels. 06-05-2020 12:46 AM
- Karma Re: How to configure transaction for sdaniels. 06-05-2020 12:46 AM
- Karma Re: Convert the timezone from a time field for kristian_kolb. 06-05-2020 12:46 AM
- Karma Re: Resolve IP to Host for emechler_splunk. 06-05-2020 12:46 AM
- Karma Re: fields.conf for emiller42. 06-05-2020 12:46 AM
- Karma Re: Convert to PST Time for ChrisG. 06-05-2020 12:46 AM
- Karma Re: Need help with Stats report for jharty_splunk. 06-05-2020 12:46 AM
- Got Karma for chart overlay with sideview util ?. 06-05-2020 12:46 AM
- Got Karma for Multiple occurrences of fields. 06-05-2020 12:46 AM
- Got Karma for Re: sort fields in a column after grouping. 06-05-2020 12:46 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
1 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
1 | |||
1 | |||
0 | |||
0 |
03-04-2014
10:12 AM
This worked perfectly, and when i added | where groupName="Group2"
I was finally able to only get a single value!(Which is one of the things I was having a lot of trouble with)
... View more
02-27-2014
07:07 PM
1 Karma
Hello,
I have log lines that look like this [ some silly example but the idea is there 🙂 ]
mm/dd/yyyy hh:mm:ss - fruit: apple count: 5 price: $4 fruit: orange count: 10 price: $10
mm/dd/yyyy hh:mm:ss - fruit: banana count: 2 price: $1 fruit: orange count: 10 price: $10 fruit: pear count: 8 price: $14
mm/dd/yyyy hh:mm:ss - fruit: pineapple count: 10 price: $40 fruit: mango count: 1 price: $1
mm/dd/yyyy hh:mm:ss - fruit: coconut count: 5 price: $8 fruit: apple count: 5 price: $1
I know how to use rex to grab the fruit, count and price values from each line. There will be variable number of pairs of those values. How do I display the information for apple only using stats or anything by date?
In my example, only first and last log lines have apple in them. I want to display the count and price of apple for those two dates.
Appreciate any help.
... View more
- Tags:
- stats
02-26-2014
05:53 PM
I am trying to parse information from a json file, but am having difficulty doing this.
Here is my sample json file:
{
"message":"OK",
"status":200,
"responseEntity":[
{
"counters":{
"SearchResult.close()":{
"name":"SearchResult.close()",
"count":42,
"max":9.0,
"min":0.0
}
},
"errors":{
},
"groupDescription":"Counters",
"groupName":"Group01"
},
{
"counters":{
"SearchResult.close()":{
"name":"SearchResult.close()",
"count":7,
"max":8.0,
"min":7.0
}
},
"errors":{
},
"groupDescription":"Counters",
"groupName":"Group2"
}
I want to be able to filter the value for "SearchResult.close().count" for groupName "group2", however I am unable to do that. I tried
| spath path=responseEntity{}.groupName output=groupName | mvexpand groupName |
But when I filter by json_group, I still get ALL values(responseEntity{}.counters.SearchResult.close().count values would be both 42, and 7)
inputs.conf file
[monitor://\HOST01\groupInfo.json]
disabled = 0
followTail = false
host = HOST01
sourcetype = JSON Testing
crcSalt =
props.conf file
[JSON Testing]
TRUNCATE = 0
KV_MODE = json
Is there a way that I can filter by groupName, then only get values that are associated with that group name, for count, max, min etc? Or is there an issue with my json file itself?
Thank you
... View more
02-24-2014
04:34 PM
I have log lines that looks this:
mm-dd-yyyy hh:mm:ss Item counts: 1000 Process ID: 12345
...
mm-dd-yyyy hh:mm:ss Save time: 34.75 seconds Process ID: 12345
...
mm-dd-yyyy hh:mm:ss Item counts: 2500 Process ID: 7890
...
mm-dd-yyyy hh:mm:ss Save time: 30.16 seconds Process ID: 7890
My goal is to find that, there are 1500 items increase from the previous event to the current event, and that the save time took 30.16 seconds to save those new 1500 items. There are several of those log lines and I can group them by Process ID. How can I accomplish this?
Appreciate any help.
... View more
- Tags:
- event
02-21-2014
11:07 AM
2 Karma
Thanks to somesoni2
base search | stats count by A,B,C | fields - count| sort B,C,num(A) | stats list(A) by B,C
... View more
02-20-2014
04:42 PM
I have stats values(A) by B, C and then I want to sort by values of A within each group. A is a numeric value. How can I accomplish that?
I tried stats values(A) as A by B, C | sort A but that's only sorting the groups, not the values within each group in the stats.
... View more
06-13-2013
03:08 PM
Hi,
I have log lines that looks like this
Fetching documents "FileName1.doc", "FileName2.xls", "FileName10.jpg", FileName342.docx" <ProcessID>
My goal is to find how many file names there are per ProcessID, given that each name is quoted and separated by a comma and a space. How can I accomplish that?
Thanks!
... View more
- Tags:
- pattern
06-13-2013
11:20 AM
Sorry, I don't understand what it has anything to do with my problem with assigning log files from subdirectories to different sourcetype.
*** Also I can't hard code the name of the log files because as I described log file name can vary. It can be any name.
... View more
06-13-2013
10:17 AM
Sorry, the slashes didn't show up correctly in my message. That's not what I need. I updated the message above.
... View more
06-11-2013
03:33 PM
I have to monitor two source types in this following directory structure
\\Server\Path\{can be any name}.log == > sourcetype = FirstLog
\\Server\Path\SubPath\{can be any name}.csv == > sourcetype = SecondLog
How do I set up the inputs.conf? Right now, my first monitor for \\Server\Path is working but the next monitor for \\Server\Path\SubPath is not working.
... View more
- Tags:
- inputs.conf
06-07-2013
10:56 AM
I would like all WorkTime values of each Type over time...not just max/min/avg over a certain time span using timechart. How can I do that?
... View more
06-07-2013
10:29 AM
1 Karma
Hi,
I have two values that I would like to draw on one time chart. Currently I have the following query that doesn't work the way I want it to.
(sourcetype="Application" Type = "A" AND WorkTime > 0) AND Project="ABC" | chart values(WorkTime) as ATime over _time | appendcols [ search (sourcetype="Application" Type = "B" AND WorkTime > 0) AND Project="ABC" | chart values(WorkTime) as BTime over _time ]
The lines for those two values are not drawing correctly on the chart. Did I do something wrong in my query? Is there an example of chart overlay using SideView Util Editor? I know how to do that in XML...Just wondering if there is a way in SideView Util Editor to do that same.
Thanks.
... View more
06-06-2013
09:17 AM
Thank you!
... View more
06-05-2013
05:05 PM
1 Karma
Hi,
I have a view where a user have to input three values before a report is created. The user must first select a report type, and then host type and the host name. The problem is the search is executing every time something changes and keep refreshing the message saying "No results found".
For example, after the user selects the report type from a Pulldown, the host type field is populated for the user. At the same time the search is already executed and the page displays "No results found". Then the user selects the host type, and the search gets executed again with the result of "No results found". It's very annoying.
I don't want the search to execute until after the user has input ALL three values. How can I control that? May be there is a way to put a "GO" button that the search will execute only when the user hits GO? Examples will be great.
Thanks!
... View more
05-28-2013
10:06 AM
That worked. Thanks!
... View more
05-24-2013
04:28 PM
I have log lines that I need to group by 4 or 5 fields so that I can find the duration. I am using transaction, but it takes a long, long, long time even for 4 hours period. What's the best way to go around it?
Thanks
... View more
- Tags:
- transaction
05-24-2013
04:02 PM
Hi,
I have two different log types under the same directory path. At first I have only imported one type of log:
[monitor://PATH]
disabled = 0
followTail = false
host = HOST1
sourcetype = A Logs
ignoreOlderThan = 2d
whitelist = A.*.log
crcSalt = <SOURCE>
blacklist = native|\.zip
.... the log lines are imported fine to Splunk. AND THEN a few weeks later I added second type of log which is under the same path ....
[monitor://PATH]
disabled = 0
followTail = false
host = HOST1
sourcetype = B Logs
ignoreOlderThan = 2d
whitelist = B.*.log
crcSalt = <SOURCE>
blacklist = native|\.zip
Now, Splunk is NOT getting any A Logs, but it has everything from B Logs.
Did I do something wrong? How can I get both types imported to Splunk?
Thanks!
... View more
- Tags:
- input.conf
05-22-2013
11:42 AM
exactly what I needed. Thanks!
... View more
05-20-2013
05:42 PM
Hi,
How can I only grab the last two distinct values from a single transaction.
For example: Search this within 24 hr period will give me a several connection values.
{Search} | transaction by Server | stats values(connection) by Server
I would like to dedup the connection values, and get the difference of the last two values. Let's say I have distinct connection counts 1, 3, 5, 2, 6, 9, 3, and 13. So my last two connections are 3 and 13, so their difference is 10.
Thanks for your help.
... View more
- Tags:
- transaction
05-13-2013
01:44 PM
Both of you are correct. It was a stupid typo. Here is my new search and it works!!! Thanks guys.
sourcetype="WMI*Security" Type="Audit Failure" Account_Name=* AND NOT (Account_Name=@@*) AND Client_Host=$click.value$ | eval status= if(len(Account_Name)=3, "InternalCount", if(like(Account_Name,"%admin%"),"AdminCount","ClientCount")) | stats values(Account_Name) values(status) as status by _time | where status="$click.name2$"
... View more
05-13-2013
12:39 PM
My search result
The job appears to have expired or has been canceled. Splunk could not retrieve data for this search.
sourcetype="WMI*Security" Type="Audit Failure" Account_Name=* AND NOT (Account_Name=@@*) AND Client_Host=HL112SPRAX04| stats values(Account_Name) | where conditional | eval conditional = case(ClientCount = InternalCount AND len(Account_Name)=3, 1,ClientCount=AdminCount AND like(Account_Name,"%admin%"),1,ClientCount=ClientCount AND len(Account_Name)!=3,1,1==1,0) | stats values(Account_Name) | where conditional="1"
... View more
05-13-2013
12:39 PM
May be I am doing something wrong:
My search:
sourcetype="WMI*Security" Type="Audit Failure" Account_Name=* AND NOT (Account_Name=@@*) AND Client_Host=$click.value$| stats values(Account_Name) | where conditional | eval conditional = case($click.name2$ = InternalCount AND len(Account_Name)=3, 1,$click.name2$=AdminCount AND like(Account_Name,"%admin%"),1,$click.name2$=ClientCount AND len(Account_Name)!=3,1,1==1,0) | stats values(Account_Name) | where conditional="1"
... View more
05-13-2013
12:18 PM
Hi,
I need to set where clause based on certain condition. For example, if value=a, then where should be x>1. If value=b, then where clause should have x>100. If value=c, then x>1000, etc.
So I did something like:
eval condition=if(value=a,x>1,if(value=b,x>100,x>1000)) | stats values(blahblah) | where condition
As expected, that doesn't work =D
Please help and let me know how I can set up variable where clause.
Thanks!
... View more
- Tags:
- where