Splunk Search

How to combine the rows of a table?

Mrig342
Contributor

Hi All,

I have logs like below in splunk.

log1: "count":1,

log2: gcg.gom.esb_159515.rg.APIMediation.Disp1.3.Rs.APIM3

log3: "count":1,

log4: gcg.gom.esb_159515.rg.APIMediation.Disp1.3.Rs.APIM2

log5: "count":1,

log6: gcg.gom.esb_159515.rg.APIMediation.Disp1.3.Rs.APIM1

I used the below query to create a table showing the "Queue" and the "Consumer count":

***** | rex field=_raw "Rs\.(?P<Queue>\w+)" | rex field=_raw "count\"\:(?P<Consumer_Count>\d+)\," | table Queue,Consumer_Count

But this query gives the table in the below manner:

Queue Consumer_Count
  1
APIM3  
  1
APIM2  
  1
APIM1  

I want the rows to be combined in the below manner:

Queue Consumer_Count
APIM3 1
APIM2 1
APIM1 1

 

Please help to modify the query to get the desired output.

Thank you..!!

Labels (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

It depends on the order of the events - try this way instead

| streamstats last(Consumer_Count) as Consumer_Count
| where isnotnull(Queue)

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| streamstats latest(Consumer_Count) as Consumer_Count
| where isnotnull(Queue)

Mrig342
Contributor

Hi @ITWhisperer 

Thank you for the query modification. However, when the Consumer_Count changes to 2 or more, it still shows 1 in the table.

For eg:

log1: "count":1,

log2: gcg.gom.esb_159515.rg.APIMediation.Disp1.3.Rs.APIM3

log3: "count":1,

log4: gcg.gom.esb_159515.rg.APIMediation.Disp1.3.Rs.APIM2

log5: "count":2,

log6: gcg.gom.esb_159515.rg.APIMediation.Disp1.3.Rs.APIM1

And query used is ***** | rex field=_raw "Rs\.(?P<Queue>\w+)" | rex field=_raw "count\"\:(?P<Consumer_Count>\d+)\," | streamstats latest(Consumer_Count) as Consumer_Count | where isnotnull(Queue) | table Queue,Consumer_Count

It still gives the table as below:

QueueConsumer_Count
APIM31
APIM21
APIM11

while the expectation was:

QueueConsumer_Count
APIM31
APIM21
APIM12

Please help to modify the query to get the table in the required manner.

Thank you..!!

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

It depends on the order of the events - try this way instead

| streamstats last(Consumer_Count) as Consumer_Count
| where isnotnull(Queue)

Mrig342
Contributor

Hi @ITWhisperer ,

This modification really works for my desired output.

Thank you so much for helping me always through your quick solutions.

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...