Hi All,
I have CSV file read by Splunk. Here is how the data look like. The field extraction is done.
APP CHANNEL IP
app1 chl1 1.1.1.1
app2 chl1 1.1.1.1
app3 chl1 1.1.1.2
app4 chl2 1.1.1.3
app5 chl2 1.1.1.3
app6 chl2 1.1.1.3
I wanted to extract what CHANNEL is connected from which IP and count for each IP connected.
Basically something like below
CHANNEL IP Count
chl1 1.1.1.1 2
1.1.1.2 1
chl2 1.1.1.3 3
I tried this, index=mycsv_index | stats count values(CHANNEL) as CHL_COUNT by IP
. But it does not seems to give me desired results.
Please help.
Regards,
Abhijit
Try like this
index=mycsv_index | stats count by IP CHANNEL | stats list(IP) as IP list(count) as Count by CHANNEL
Try like this
index=mycsv_index | stats count by IP CHANNEL | stats list(IP) as IP list(count) as Count by CHANNEL
Try this
index=mycsv_index | stats count by IP CHANNEL | stats list(IP) as IP list(count) as Count sum(count) as TotalConn by CHANNEL
You are awesome..Thanks
Thanks @somesoni2. Worked perfectly for me. Appreciate your help.
Can I also get a total IPs count added to the same output. If this works out I can use that column (say - TotalChannelConn) to send alert when a channel total connection reaches a certain threshold.
Something like this.
+---------+---------+-------+-------------+
| CHANNEL | IP | COUNT | TOTAL_COUNT |
+---------+---------+-------+-------------+
| chl1 | 1.1.1.1 | 2 | 3 |
+---------+---------+-------+-------------+
| | 1.1.1.2 | 1 | |
+---------+---------+-------+-------------+
| chl2 | 1.1.1.3 | 3 | 3 |
+---------+---------+-------+-------------+