Splunk Enterprise

How do I get a count of Low, Medium, High, Critical in a Splunk Search?

nrs011
Observer

How do I get a count of Low, Medium, High, Critical in a Splunk Search?

 

This is the current search I am using:

`get_tenable_index` sourcetype="tenable:sc:vuln" severity=Low OR severity=Medium OR severity=High OR severity=Critical | dedup plugin_id, port, protocol, sc_uniqueness, source | eval key=plugin_id."_".port."_".protocol."_".sc_uniqueness."_".source | table severity, synopsis, solution, port, protocol, ip | outputlookup append=true key_field=key sc_vuln_data_lookup

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Use the eventstats command to get a count.  The by option creates a separate count for each field value.

`get_tenable_index` sourcetype="tenable:sc:vuln" severity=Low OR severity=Medium OR severity=High OR severity=Critical 
| dedup plugin_id, port, protocol, sc_uniqueness, source 
| eval key=plugin_id."_".port."_".protocol."_".sc_uniqueness."_".source 
| eventstats count by severity
| table severity, synopsis, solution, port, protocol, ip 
| outputlookup append=true key_field=key sc_vuln_data_lookup

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...