How to split columns in a bar chart based on part of a field?

New Member

I have input data from a software runtime log in the form:


The "ERROR MESSAGE" field could be one of two messages:

  • "Could not connect to : Timed out"
  • "Could not connect to : No route to host"

I'd like to split the columns in the chart by colour between the two types (timed out vs no route), but because of the "server IP" being in the message, instead of two columns every hour, I get about 100, one for each server IP, since the IP address makes each message look unique.

By the way, I'm relatively new to Splunk so if there is an obvious answer or my question sounds trivial and has been answered plenty of times before, I apologize.
Is there any way to split the columns into just two, ignoring the server IP in the message - therefore just splitting based on part of the message.

0 Karma


There are two things you want to do here. First is to grab the back part of the error message, and the second is to count them separately.

To do the first thing, create a new field using rex (I'm calling it EndMessage here). To do the second thing, split the result by that message:

...your search... | rex field="ERROR MESSAGE" ":\s(?<EndMessage>.*)" | timechart span=1h count by EndMessage

You should be able to create a stacked bar chart or split column chart based on this information.

Get Updates on the Splunk Community!

Splunk Forwarders and Forced Time Based Load Balancing

Splunk customers use universal forwarders to collect and send data to Splunk. A universal forwarder can send ...

NEW! Log Views in Splunk Observability Dashboards Gives Context From a Single Page

Today, Splunk Observability releases log views, a new feature for users to add their logs data from Splunk Log ...

Last Chance to Submit Your Paper For BSides Splunk - Deadline is August 12th!

Hello everyone! Don't wait to submit - The deadline is August 12th! We have truly missed the community so ...