Splunk Search

Count based on extracted field

athorat
Communicator

Hi

I have an event which has something like
/getproxy..... size:1
/getproxy..... size:10
/getproxy..... size:0

Want to calculate the total count when the size!=0 and count when size=0
using a rex in the search to extract size value

| rex "size:(?<Size>\d+)"

Any help appreciated

Tags (1)
0 Karma
1 Solution

fdi01
Motivator

try like :

 ...| rex "size:(?<Size>\d+)"|stats sum(eval(Size!=0)) as "total size!=0" sum(eval(Size=0)) as "total size=0"|...

or
for the number of time size!=0 and number of time size=0 try this:

 ...| rex "size:(?<Size>\d+)"|stats count(eval(Size!=0)) as "number of time size!=0" count(eval(Size=0)) as "number of time size=0"|...

View solution in original post

0 Karma

fdi01
Motivator

try like :

 ...| rex "size:(?<Size>\d+)"|stats sum(eval(Size!=0)) as "total size!=0" sum(eval(Size=0)) as "total size=0"|...

or
for the number of time size!=0 and number of time size=0 try this:

 ...| rex "size:(?<Size>\d+)"|stats count(eval(Size!=0)) as "number of time size!=0" count(eval(Size=0)) as "number of time size=0"|...
0 Karma

sideview
SplunkTrust
SplunkTrust

Of if you're more comfortable leaving eval tasks to the eval command, more or less the same idea would look like:
...| rex "size:(?\d+)"|eval type=if(Size=0,"zero","nonzero") | stats count by type

Get Updates on the Splunk Community!

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...

From GPU to Application: Monitoring Cisco AI Infrastructure with Splunk Observability ...

AI workloads are different. They demand specialized infrastructure—powerful GPUs, enterprise-grade networking, ...

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...