Splunk Search

Cannot get count by case statement

tjsnow
Explorer

I am trying to simply break down a url to extract the region and chart the use of specific urls over time. but i just get a NULL count of everything. How do i display the counts as separate values?

 

[query] | eval region=case(url like "%region1%","Region 1",url like "%region2%","Region 2") | timechart span=1h count by region
Labels (3)
0 Karma
1 Solution

johnhuang
Motivator

You can use LIKE or MATCH

 

| eval region=CASE(LIKE(url, "%region1%"), "Region 1", LIKE(url, "%region2%"), "Region 2")

| eval region=CASE(MATCH(url, "region1"), "Region 1", MATCH(url, "region2"), "Region 2")

View solution in original post

yuanliu
SplunkTrust
SplunkTrust

Going back to my four commandments of asking answerable questions:

  • Illustrate data input (in raw text, anonymize as needed), whether they are raw events or output from a search (SPL that volunteers here do not have to look at).
  • Illustrate the desired output from illustrated data.
  • Explain the logic between illustrated data and desired output without SPL.
  • If you also illustrate attempted SPL, illustrate actual output and compare with desired output, explain why they look different to you if that is not painfully obvious.

Until you can illustrate your data, no one can help you.  On the surface, your case function should work given this set of data:

url
abc.fromregion1.com
def.toregion2wego.com
ghi.fromregion1toregion2.com

You can run a stats and get

regioncount
Region 12
Region 21

Here is the emulation to prove the above.

 

| makeresults format=csv data="url
abc.fromregion1.com
def.toregion2wego.com
ghi.fromregion1toregion2.com"
``` data emulation above ```
| eval region=case(url like "%region1%","Region 1",url like "%region2%","Region 2")
| stats count by region

 

0 Karma

johnhuang
Motivator

You can use LIKE or MATCH

 

| eval region=CASE(LIKE(url, "%region1%"), "Region 1", LIKE(url, "%region2%"), "Region 2")

| eval region=CASE(MATCH(url, "region1"), "Region 1", MATCH(url, "region2"), "Region 2")
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

  Ready to master Kubernetes and cloud monitoring like the pros?Join Splunk’s Growth Engineering team for an ...

Wrapping Up Cybersecurity Awareness Month

October might be wrapping up, but for Splunk Education, cybersecurity awareness never goes out of season. ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...