<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to get pattern recognition in Splunk in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/595321#M207188</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/179778"&gt;@MousumiChowdhur&lt;/a&gt;&amp;nbsp;Thanks it work, but some lines are huge specially exception one, how can trim only first line of error?&lt;/P&gt;&lt;P&gt;e.g. current output&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2022-04-25 15:35:10,514 ERROR [APP] User User1 invalid: javax.security.auth.login.LoginException: User T75171 invalid at ws.loginmodule.Spi.login(LoginModuleSpi.java:356) [loginModule2-1.0.0-SNAPSHOT.jar:] at ws.loginmodule.ModuleSpi.login(LoginModuleSpi.java:172) [loginModule2-1.0.0-SNAPSHOT.jar:] at sun.reflect.GeneratedMethodAccessor1495.invoke(Unknown Source) [:1.8.0_275] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) [rt.jar:1.8.0_275] at java.lang.reflect.Method.invoke(Method.java:498) [rt.jar:1.8.0_275] at javax.security.auth.login.LoginContext.invoke(LoginContext.java:755) [rt.jar:1.8.0_275] at javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) [rt.jar:1.8.0_275] at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) [rt.jar:1.8.0_275]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;expected output:&lt;/P&gt;&lt;P&gt;_raw&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; count&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2022-04-25 15:35:10,514 ERROR [APP] User User1 invalid: javax.security.auth.login.LoginException&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 550&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;any idea?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 26 Apr 2022 04:57:52 GMT</pubDate>
    <dc:creator>indeed_2000</dc:creator>
    <dc:date>2022-04-26T04:57:52Z</dc:date>
    <item>
      <title>How to get pattern recognition in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347472#M102906</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I want to get my event patterns to be recognized automatically. The pattern is not uniform but Splunk should identify any small difference in the events and should give the trend or count of the patterns over time. How can I achieve this? &lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 09:38:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347472#M102906</guid>
      <dc:creator>MousumiChowdhur</dc:creator>
      <dc:date>2017-12-18T09:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to get pattern recognition in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347473#M102907</link>
      <description>&lt;P&gt;Maybe the following would be useful - &lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/6.6.3/Search/Detectingpatterns"&gt;Detecting patterns&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 10:55:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347473#M102907</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2017-12-18T10:55:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to get pattern recognition in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347474#M102908</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;

&lt;P&gt;I have tried using cluster. Below is my query:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=&amp;lt;index&amp;gt; | cluster showcount=t t=0.7 labelonly=t | table _time cluster_count cluster_label _raw | dedup 1 cluster_label | sort - cluster_count cluster_label _time | chart values(cluster_count) as count by _raw | sort limit=20 - count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Is this a correct approach to find the latest patterns that have occurred the most?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 12:16:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347474#M102908</guid>
      <dc:creator>MousumiChowdhur</dc:creator>
      <dc:date>2017-12-18T12:16:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to get pattern recognition in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347475#M102909</link>
      <description>&lt;P&gt;I have used the below query to find the pattern recognition which is working fine for me:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=&amp;lt;index&amp;gt; | cluster t=0.7 labelonly=t | findkeywords labelfield=cluster_label | table sampleEvent percentInInputGroup | sort - percentInInputGroup
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 20 Dec 2017 06:42:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347475#M102909</guid>
      <dc:creator>MousumiChowdhur</dc:creator>
      <dc:date>2017-12-20T06:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to get pattern recognition in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347476#M102910</link>
      <description>&lt;P&gt;There is a very simple way of doing this - In your event, there is a default field called &lt;CODE&gt;punct&lt;/CODE&gt;. &lt;/P&gt;

&lt;P&gt;This seem like some alien language which is not understandable at the first look. But its very helpful one. How it works is - in a event, it strips all letters, numbers and replace Whitespace with the Underscore. Leaving just the &lt;CODE&gt;PUNCT&lt;/CODE&gt;uation.&lt;/P&gt;

&lt;P&gt;Best part is this field gets extracted by Splunk automatically.  &lt;/P&gt;

&lt;P&gt;We can directly separate a specific type of events belonging to to specific pattern. We use the punct field to find anomalies in data. &lt;/P&gt;

&lt;P&gt;For example, If 99% of your events are like this &lt;CODE&gt;____::__[]:________...___&lt;/CODE&gt; and 1% look like this &lt;CODE&gt;..._-_-_[//:::]_"_//.?=__."___"://../.?=&amp;amp;=-"_"/._(&lt;/CODE&gt; then we can easily find the odd one out (undesired one) using this field.&lt;/P&gt;

&lt;P&gt;This will show the count of patterns among your events. All events of same patterns will be grouped. &lt;/P&gt;

&lt;P&gt;It is a fantastic way to quickly point you to the outliers that didn't match the pattern you expected.&lt;/P&gt;

&lt;P&gt;Very helpful in finding anomalous event among large data set OR writing complex regex's for field extraction to ensure all events are covered.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Usedefaultfields#punct"&gt;more information about punct is here&lt;/A&gt;. I hope this answers your question.   &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Thank you - Saurabh&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2017 08:15:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347476#M102910</guid>
      <dc:creator>saurabh_tek11</dc:creator>
      <dc:date>2017-12-20T08:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to get pattern recognition in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347477#M102911</link>
      <description>&lt;P&gt;As in Splunk 6.3, &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.3.0/Knowledge/Abouteventtypes#Use_the_punct_field_to_search_on_similar_events"&gt;Use the punct field to search on similar events&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2017 08:42:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347477#M102911</guid>
      <dc:creator>saurabh_tek11</dc:creator>
      <dc:date>2017-12-20T08:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to get pattern recognition in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347478#M102912</link>
      <description>&lt;P&gt;@MousumiChowdhury - does this helps ?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 10:25:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347478#M102912</guid>
      <dc:creator>saurabh_tek11</dc:creator>
      <dc:date>2017-12-21T10:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to get pattern recognition in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347479#M102913</link>
      <description>&lt;P&gt;@MousumiChowdhury - hope this answers your question as this way you dont have to write a custom search and you can use a default fields to get the pattern matching. if it supports your question, please accept this answer. &lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 09:41:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/347479#M102913</guid>
      <dc:creator>saurabh_tek11</dc:creator>
      <dc:date>2018-01-03T09:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to get pattern recognition in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/595321#M207188</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/179778"&gt;@MousumiChowdhur&lt;/a&gt;&amp;nbsp;Thanks it work, but some lines are huge specially exception one, how can trim only first line of error?&lt;/P&gt;&lt;P&gt;e.g. current output&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2022-04-25 15:35:10,514 ERROR [APP] User User1 invalid: javax.security.auth.login.LoginException: User T75171 invalid at ws.loginmodule.Spi.login(LoginModuleSpi.java:356) [loginModule2-1.0.0-SNAPSHOT.jar:] at ws.loginmodule.ModuleSpi.login(LoginModuleSpi.java:172) [loginModule2-1.0.0-SNAPSHOT.jar:] at sun.reflect.GeneratedMethodAccessor1495.invoke(Unknown Source) [:1.8.0_275] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) [rt.jar:1.8.0_275] at java.lang.reflect.Method.invoke(Method.java:498) [rt.jar:1.8.0_275] at javax.security.auth.login.LoginContext.invoke(LoginContext.java:755) [rt.jar:1.8.0_275] at javax.security.auth.login.LoginContext.access$000(LoginContext.java:195) [rt.jar:1.8.0_275] at javax.security.auth.login.LoginContext$4.run(LoginContext.java:682) [rt.jar:1.8.0_275]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;expected output:&lt;/P&gt;&lt;P&gt;_raw&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; count&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2022-04-25 15:35:10,514 ERROR [APP] User User1 invalid: javax.security.auth.login.LoginException&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 550&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;any idea?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 04:57:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-get-pattern-recognition-in-Splunk/m-p/595321#M207188</guid>
      <dc:creator>indeed_2000</dc:creator>
      <dc:date>2022-04-26T04:57:52Z</dc:date>
    </item>
  </channel>
</rss>

