Our auditors asked a question, that caused the need to know how many records we log, per device, per sourcetype, per day.
To run the search each day would be killer on the search heads and indexers, based on our volume. So it was suggested that we create and populate a summary index, and then run searches, and perhaps a dashboard, from there.
This search gives me the output I need.
index=* | eval date=strftime(_time,"%Y-%m-%d") | stats count by host index sourcetype date | table host, index, sourcetype, date, count |sort index, sourcetype
How would I convert this to a summary index, where I could get something like this as an output. Allowing me to search by server, sourcetype, index, or date.
host index sourcetype date count
Server001 app1_iis iis 5/8/2017 13671
Server001 app2_iis iis 5/8/2017 448838
Server001 app3_iis iis 5/8/2017 24
Server001 app4_iis iis 5/8/2017 35890
Server001 windows WinRegistry 5/8/2017 2314924
Server001 wineventlog WinEventLog:Security 5/8/2017 75489
Using Splunk Enterprise 6.5.1
Thank you in advance
... View more