Splunk Enterprise

How do I get a count of Low, Medium, High, Critical in a Splunk Search?

nrs011
Observer

How do I get a count of Low, Medium, High, Critical in a Splunk Search?

 

This is the current search I am using:

`get_tenable_index` sourcetype="tenable:sc:vuln" severity=Low OR severity=Medium OR severity=High OR severity=Critical | dedup plugin_id, port, protocol, sc_uniqueness, source | eval key=plugin_id."_".port."_".protocol."_".sc_uniqueness."_".source | table severity, synopsis, solution, port, protocol, ip | outputlookup append=true key_field=key sc_vuln_data_lookup

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Use the eventstats command to get a count.  The by option creates a separate count for each field value.

`get_tenable_index` sourcetype="tenable:sc:vuln" severity=Low OR severity=Medium OR severity=High OR severity=Critical 
| dedup plugin_id, port, protocol, sc_uniqueness, source 
| eval key=plugin_id."_".port."_".protocol."_".sc_uniqueness."_".source 
| eventstats count by severity
| table severity, synopsis, solution, port, protocol, ip 
| outputlookup append=true key_field=key sc_vuln_data_lookup

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...