<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SNMP Data Events, need help matching indexed values with regex in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/SNMP-Data-Events-need-help-matching-indexed-values-with-regex/m-p/395194#M21132</link>
    <description>&lt;P&gt;It looks like with your query , values existed on all three columns (_time, indexes and myerrorCount for &lt;CODE&gt;| xyseries _time indexes myerrorCount&lt;/CODE&gt; and that's why it is displaying data, however when you try to run &lt;CODE&gt;| xyseries _time indexes myelementID&lt;/CODE&gt; that does not have values in indexes where elemetnID value is present and due to that it is not generating any output.&lt;/P&gt;</description>
    <pubDate>Mon, 14 Jan 2019 09:39:48 GMT</pubDate>
    <dc:creator>harsmarvania57</dc:creator>
    <dc:date>2019-01-14T09:39:48Z</dc:date>
    <item>
      <title>SNMP Data Events, need help matching indexed values with regex</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/SNMP-Data-Events-need-help-matching-indexed-values-with-regex/m-p/395191#M21129</link>
      <description>&lt;P&gt;I am using the SNMP Modular Input package found here: &lt;A href="https://splunkbase.splunk.com/app/1537/"&gt;https://splunkbase.splunk.com/app/1537/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;My Splunk events appear as the following: &lt;/P&gt;

&lt;P&gt;MYMIB::errorCounter."0" = "10" MYMIB::errorCounter."1" = "12" MYMIB::errorCounter."2" = "13" MYMIB::errorCounter."3" = "17" MYMIB::elementID."0" = "compid1" MYMIB::elementID."1" = "amescomp2" MYMIB::elementID."2" = "othercompid" MYMIB::elementID."3" = "hi" &lt;BR /&gt;
sourcetype =    snmp_ta&lt;/P&gt;

&lt;P&gt;I am trying to match each errorCounter and elementID with the same index, denoted by ."".  I want to create a time chart that will show the change in errorCount for each unique elementID over time. Currently, both the fields and indexes are not being recognized by Splunk. I tried using the REX command to extract data but I am having a hard time finding a solution that will work when I add another 100+ indexes of data per event. Any help would be appreciated thank you so much.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 23:38:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/SNMP-Data-Events-need-help-matching-indexed-values-with-regex/m-p/395191#M21129</guid>
      <dc:creator>loren3737</dc:creator>
      <dc:date>2019-01-09T23:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP Data Events, need help matching indexed values with regex</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/SNMP-Data-Events-need-help-matching-indexed-values-with-regex/m-p/395192#M21130</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Try below query&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;yourBasesearch&amp;gt;
 | rex "::(?&amp;lt;a&amp;gt;\w+)\.\"(?&amp;lt;b&amp;gt;\d+)\"\s\=\s\"(?&amp;lt;c&amp;gt;\w+)\"" max_match=0
 | eval d=mvzip(a,b), e=mvzip(d,c)
 | mvexpand e
 | eval f=mvindex(split(e,","),0), h=mvindex(split(e,","),2)
 | eval {f}=h
 | stats list(elementID) as elementID, list(errorCounter) as errorCounter by _time
 | eval i = mvzip(elementID,errorCounter)
 | mvexpand i
 | eval elementID=mvindex(split(i,","),0), errorCounter=mvindex(split(i,","),1)
 | timechart avg(errorCounter) by elementID
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 11 Jan 2019 11:53:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/SNMP-Data-Events-need-help-matching-indexed-values-with-regex/m-p/395192#M21130</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2019-01-11T11:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP Data Events, need help matching indexed values with regex</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/SNMP-Data-Events-need-help-matching-indexed-values-with-regex/m-p/395193#M21131</link>
      <description>&lt;P&gt;Thank you so much for your response! It helped out a lot. I was able to adjust the query slightly to get just about what I wanted. Unfortunately, in the xyseries portion of my query below "| xyseries _time indexes myerrorCount" I would like to replace indexes with myelementID but when I do so my visualization stops appearing. Is there something that I'm missing? &lt;/P&gt;

&lt;P&gt;sourcetype="snmp_ta"&lt;BR /&gt;
  | rex "::(?\w+).\"(?&lt;B&gt;\d+)\"\s=\s\"(?\w+)\"" max_match=0&lt;BR /&gt;
  | eval d=mvzip(a,b), e=mvzip(d,c)&lt;BR /&gt;
  | mvexpand e&lt;BR /&gt;
  | eval m=mvfilter(match(e, ".&lt;EM&gt;errorCount.&lt;/EM&gt;"))&lt;BR /&gt;
  | eval n=mvfilter(match(e, ".&lt;EM&gt;elementID.&lt;/EM&gt;"))&lt;BR /&gt;
  | eval indexes=mvindex(split(m,","),1), myerrorCount=mvindex(split(m,","),2), myelementID=mvindex(split(n,","),2)&lt;BR /&gt;
  | xyseries _time indexes myerrorCount&lt;BR /&gt;
&lt;/B&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:41:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/SNMP-Data-Events-need-help-matching-indexed-values-with-regex/m-p/395193#M21131</guid>
      <dc:creator>loren3737</dc:creator>
      <dc:date>2020-09-29T22:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP Data Events, need help matching indexed values with regex</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/SNMP-Data-Events-need-help-matching-indexed-values-with-regex/m-p/395194#M21132</link>
      <description>&lt;P&gt;It looks like with your query , values existed on all three columns (_time, indexes and myerrorCount for &lt;CODE&gt;| xyseries _time indexes myerrorCount&lt;/CODE&gt; and that's why it is displaying data, however when you try to run &lt;CODE&gt;| xyseries _time indexes myelementID&lt;/CODE&gt; that does not have values in indexes where elemetnID value is present and due to that it is not generating any output.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jan 2019 09:39:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/SNMP-Data-Events-need-help-matching-indexed-values-with-regex/m-p/395194#M21132</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2019-01-14T09:39:48Z</dc:date>
    </item>
  </channel>
</rss>

