Splunk Search

Cant nest functions ??

Contributor

v4.3.1 linux

so apparently Splunk will not execute nested functions.

example
| stats count,values(src),count(values(src)),values(eventdesc) by errorcode | sort - count

in my search "values(src)" returns a list of IP's, so "count(values(src))" should return a integer value indicating how many entries were in "values(src)". i get a "0" value.

ok, so it dont work, not sure if it should, but it dont, so whats the workaround for this?

Tags (3)
0 Karma
1 Solution

Legend

You can't nest these, but you can do

stats count values(src) dc(src) values(event_desc) by error_code

dc stands for "distinct_count" which is the number of unique values for the field.

View solution in original post

Legend

You can't nest these, but you can do

stats count values(src) dc(src) values(event_desc) by error_code

dc stands for "distinct_count" which is the number of unique values for the field.

View solution in original post

Legend


[search |
top limit=5 errorcode | fields + errorcode] |
top showperc=f ip by error_code

This does not give you a sub-total by error_code, but it does do all the rest... Substitute the appropriate search critera for in both places...

0 Karma

Contributor

great, i missied dc for some reason when reading stats in docs. thnx

also, how would you make a search to find top 5 error codes, then for each error code find the top 10 responsible IP, where the table lists error code, count by error code, top 10 IP for each error code, and, a count(src) by error_code # next to each of the 10 IP's ?

in english terms, give top 5 errorcode events, for each event list top 10 IP's, for each IP list # of times it was responsible for generating the errorcode.

0 Karma