Splunk Search

logical grouping of hosts - aggregate stats

desertpilotjc
Explorer

I have a situation where I want to report on events from 2 sets of servers where i can compare the aggregate counts. I want all the results grouped into 2 tallies. In other words...

  • 10 total servers
  • 7 servers in Group A
  • 3 servers in Group B

I want to do some timechart and other stats reports that have the tallies for the events labeled / displayed as Group A and Group B - not all the individual servers as would be the case with the "host=xxxxx"scenario. Can this be done?

TIA!

Tags (1)
0 Karma

alterdego
Path Finder
0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...