Splunk Search

How to generate a search that counts specific strings that occur in _raw data?

riotto
Path Finder

I have raw data events that contain the words "Request" or "Response" or "Offer". Each event will contain only one of these strings, but it will maybe have the string several times in the event. I want to count the how many events contain "Offer" and how many events contain "Response" and how many events contain "Request"..this should be easy but I am struggling to get it right, any help will be appreciated

0 Karma
1 Solution

woodcock
Esteemed Legend

Like this:

Your Base Search Here | stats count AS Total count(eval(searchmatch("Request"))) AS Requests count(eval(searchmatch("Response"))) AS Response count(eval(searchmatch("Offer"))) AS Offer

View solution in original post

DalJeanis
Legend

Oh, you need to see at least three different ways to do this, so here's another...

If the words are always capitalized exactly as you had them...

your search here
| rex "(?<rectype>Request|Response|Offer)"
| stats count by rectype

...or if they might vary...

your search here
| rex "(i)(?<rectype>Request|Response|Offer)"
| eval rectype=lower(rectype)
| stats count by rectype

woodcock
Esteemed Legend

Like this:

Your Base Search Here | stats count AS Total count(eval(searchmatch("Request"))) AS Requests count(eval(searchmatch("Response"))) AS Response count(eval(searchmatch("Offer"))) AS Offer

riotto
Path Finder

This work great..Thanks

0 Karma

cmerriman
Super Champion

you could add in an eval like this:

|eval fieldCount=if(like(_raw,"%Request%") OR like(_raw,"%Response%") OR like(_raw,"%Offer%"),1,0)|stats sum(fieldCount) as total by eventIdentifier
0 Karma

riotto
Path Finder

Thank for the quick reply, but I need a count for each

ie. Responses=6
Request=10
Offer=25

0 Karma
Get Updates on the Splunk Community!

Demo Day: Strengthen Your SOC with Splunk Enterprise Security 8.1

Today’s threat landscape is more complex than ever. Security operation centers (SOCs) are overwhelmed with ...

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...