Splunk Search

Group event

Nadeige
New Member

Hello,

I have some log events that are structured like that:

<timestamp> - [INFO] <serialnumber 1>
<timestamp> - [INFO] <errocode>
<timestamp> - [INFO] <errocode>
<timestamp> - [INFO] <serialnumber 2>
<timestamp> - [INFO] <errocode>

How can I group the error_code events with the corresponding serialnumber event, meaning the previous event?

Thank you

Labels (1)
0 Karma

to4kawa
Ultra Champion
| makeresults
| eval _raw="- [INFO] 123456
- [INFO] 402
- [INFO] 404
- [INFO] 789012
- [INFO] 412"
| multikv noheader=t
| table _time _raw
| streamstats count
| eval _time = _time + count * 2
| rex "(?<serialnumber>\d{6})"
| rex "\b(?<error_code>\d{3}"\b)
| streamstats count(eval(serialnumber)) as session
| eventstats list(error_code) by session

like above?
sort _time (or reverse) and try streamstats

0 Karma

isoutamo
SplunkTrust
SplunkTrust

Are you looking for search or indexing time solutions?

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...