Splunk Search

How to count values across multiple similarly named fields

o_cardoso
Engager

Hi!

Given 2 events:

SummaryDialog Component1=wxt_12 Component2=wyt_1 Component3=wzt_3 Component4=wbt_2

SummaryDialog Component1=wyt_2 Component2=wxt_12 Component3=wbt_2 Component4=wzt_1

 

I'm trying to get a summary of the occurrences of each unique value regardless of the component:

wbt_2 2

wxt_12 2

wyt_1 1

wyt_2 1

wzt_3 1

wzt_6 1

Naively, I hoped this would work:

index=cls_preprod SummaryDialog | stats count by component*

 

It does not (returns no results).  Does anyone have any suggestions?  I've been googling for awhile and have not hit upon a viable solution. Note there a N number of components

Thanks!

(and forgive me if this is a basic question.. i am very basic splunk user)

 

Labels (1)
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex max_match=0 "Component[^=]+=(?<component>\S+)"
| stats count by component

View solution in original post

o_cardoso
Engager

works great, thanks!!

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| rex max_match=0 "Component[^=]+=(?<component>\S+)"
| stats count by component
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...