Splunk Search

How to get the number of events in a timechart query?

niroren
New Member

Hi,

I have a question about timechart query.
Lets say I have a log line like: "I found XXX matches"
How can I query and get - number of events of "I found" and number of the same events that XXX>0 in the same timechart
(i.e total number of events with the string and the number of events that I found something (XXX>0))

Thanks for your help,
Nir

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Perhaps this will get you started.

index=foo | rex "I found (?<num>\d+) matches" | stats count as  Total count(eval(num>0)) as nonZero
---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Perhaps this will get you started.

index=foo | rex "I found (?<num>\d+) matches" | stats count as  Total count(eval(num>0)) as nonZero
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

SOC4Kafka - New Kafka Connector Powered by OpenTelemetry

The new SOC4Kafka connector, built on OpenTelemetry, enables the collection of Kafka messages and forwards ...

Your Voice Matters! Help Us Shape the New Splunk Lantern Experience

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Building Momentum: Splunk Developer Program at .conf25

At Splunk, developers are at the heart of innovation. That’s why this year at .conf25, we officially launched ...