<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Group Events with pattern in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Group-Events-with-pattern/m-p/697877#M237041</link>
    <description>&lt;P&gt;Have you tried the "Patterns" tab?&amp;nbsp; That can show patterns in your results if you have enough events for Splunk to analyze.&lt;/P&gt;&lt;P&gt;If you have a finite set of events then you may be able to group them using a &lt;FONT face="courier new,courier"&gt;case&lt;/FONT&gt; function and the &lt;FONT face="courier new,courier"&gt;stats&lt;/FONT&gt; command.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;...
| eval warn = case(match(_raw, "ConfigurationLoader - Deprecated configuration detected in path .*?. Please update your settings to use the latest configuration options.", "ConfigurationLoader - Deprecated configuration detected in path. Please update your settings to use the latest configuration options",
    match(_raw, "QueryExecutor - Query execution time exceeded the threshold .*", "QueryExecutor - Query execution time exceeded the threshold.  Query:",
    match(_raw, "MemoryMonitor - High memory usage detected: .*? of allocated memory is in use. Consider increasing the available memory.", "MemoryMonitor - High memory usage detected: of allocated memory is in use. Consider increasing the available memory.",
    1==1, _raw)
| stats count by warn&lt;/LI-CODE&gt;&lt;P&gt;Of course, this requires you to know which warnings are of interest and becomes impractical when there is a large number of them.&lt;/P&gt;</description>
    <pubDate>Sun, 01 Sep 2024 00:13:26 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2024-09-01T00:13:26Z</dc:date>
    <item>
      <title>Group Events with pattern</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Group-Events-with-pattern/m-p/697870#M237040</link>
      <description>&lt;P&gt;Hi Splunk Experts,&lt;BR /&gt;I've been trying to group "WARN" logs, but they have a pattern (Dynamic/ Argument values) in them. I'm aware of rex, but I don't want to manually rex for 1000s of such different events. I've even tried cluster, but that doesn't suits well my usecase. Any assistance would be much appreciated.!! Thanks in advance.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2024-08-31 12:34:56 WARN  ConfigurationLoader - Deprecated configuration detected in path /xx/yy/zz. Please update your settings to use the latest configuration options.
2024-08-31 12:34:56 WARN  ConfigurationLoader - Deprecated configuration detected in path /aa/dd/jkl. Please update your settings to use the latest configuration options.
2024-08-31 14:52:34 WARN  QueryExecutor - Query execution time exceeded the threshold: 12.3 seconds. Query: SELECT * FROM users WHERE last_login &amp;gt; '2024-01-01'.
2024-08-31 14:52:34 WARN  QueryExecutor - Query execution time exceeded the threshold: 21.9 seconds. Query: SELECT * FROM contacts WHERE contact_id &amp;gt; '252’.
2024-08-31 14:52:34 WARN  QueryExecutor - Query execution time exceeded the threshold: 9.5 seconds. Query: SELECT * FROM users WHERE user_id = '123024001'.
2024-08-31 13:45:10 WARN  MemoryMonitor - High memory usage detected: 85% of allocated memory is in use. Consider increasing the available memory.
2024-08-31 13:45:10 WARN  MemoryMonitor - High memory usage detected: 58% of allocated memory is in use. Consider increasing the available memory.
2024-08-31 14:52:34 WARN  QueryExecutor - Query execution time exceeded the threshold: 32.3 seconds. Query: SELECT * FROM users WHERE last_login &amp;gt; '2024-01-01'.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;BR /&gt;I wish to group them something like below to group similar events!!&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="497"&gt;&lt;P&gt;WARN&amp;nbsp; ConfigurationLoader Deprecated configuration detected in path. Please update your settings to use the latest configuration options&lt;/P&gt;&lt;/TD&gt;&lt;TD width="68"&gt;&lt;P&gt;&amp;nbsp;2&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="497"&gt;&lt;P&gt;WARN&amp;nbsp; QueryExecutor Query execution time exceeded the threshold: . Query:&lt;/P&gt;&lt;/TD&gt;&lt;TD width="68"&gt;&lt;P&gt;&amp;nbsp;4&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="497"&gt;&lt;P&gt;WARN&amp;nbsp; MemoryMonitor High memory usage detected: of allocated memory is in use. Consider increasing the available memory.&lt;/P&gt;&lt;/TD&gt;&lt;TD width="68"&gt;&lt;P&gt;&amp;nbsp;2&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Sat, 31 Aug 2024 17:05:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Group-Events-with-pattern/m-p/697870#M237040</guid>
      <dc:creator>Thulasinathan_M</dc:creator>
      <dc:date>2024-08-31T17:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Group Events with pattern</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Group-Events-with-pattern/m-p/697877#M237041</link>
      <description>&lt;P&gt;Have you tried the "Patterns" tab?&amp;nbsp; That can show patterns in your results if you have enough events for Splunk to analyze.&lt;/P&gt;&lt;P&gt;If you have a finite set of events then you may be able to group them using a &lt;FONT face="courier new,courier"&gt;case&lt;/FONT&gt; function and the &lt;FONT face="courier new,courier"&gt;stats&lt;/FONT&gt; command.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;...
| eval warn = case(match(_raw, "ConfigurationLoader - Deprecated configuration detected in path .*?. Please update your settings to use the latest configuration options.", "ConfigurationLoader - Deprecated configuration detected in path. Please update your settings to use the latest configuration options",
    match(_raw, "QueryExecutor - Query execution time exceeded the threshold .*", "QueryExecutor - Query execution time exceeded the threshold.  Query:",
    match(_raw, "MemoryMonitor - High memory usage detected: .*? of allocated memory is in use. Consider increasing the available memory.", "MemoryMonitor - High memory usage detected: of allocated memory is in use. Consider increasing the available memory.",
    1==1, _raw)
| stats count by warn&lt;/LI-CODE&gt;&lt;P&gt;Of course, this requires you to know which warnings are of interest and becomes impractical when there is a large number of them.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Sep 2024 00:13:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Group-Events-with-pattern/m-p/697877#M237041</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2024-09-01T00:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: Group Events with pattern</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Group-Events-with-pattern/m-p/697882#M237042</link>
      <description>&lt;P&gt;If you want Splunk to "guess", you might look at MLTK.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Sep 2024 08:52:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Group-Events-with-pattern/m-p/697882#M237042</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-09-01T08:52:50Z</dc:date>
    </item>
  </channel>
</rss>

