All Apps and Add-ons

Search _internal by Series

hartfoml
Motivator

I have created two letter ID's for my indexes. I would like to know how each index is doing so I search the _internal for the index name like this:
index="_internal" source="*metrics.log" per_index_thruput series="aa"
this will show me the amount of data indexed and I can count or sum or timechart.
I want to do this for all my two letter series but I don't know how to do the search without including all the unwanted series. Somehow I need to restrict the (series="**") to only two letters. All the other series have more than two letters.

0 Karma
1 Solution

Lamar
Splunk Employee
Splunk Employee

Try this:

index=_internal source=*metrics.log group="per_index_thruput" | rex field=series "^(?<good>[a-z_]{2})$" | search good=*

View solution in original post

Lamar
Splunk Employee
Splunk Employee

Try this:

index=_internal source=*metrics.log group="per_index_thruput" | rex field=series "^(?<good>[a-z_]{2})$" | search good=*

hartfoml
Motivator

Thanks that was the key

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...