Splunk Search

How to match string and apply stats count on a stats count table

rkishoreqa
Communicator

I have a requirement to fetch stats count from raw data logs. Sharing you the query and results.

Query : index="bw6_stg" sourcetype="HYD01"| rex field=_raw "ApplicationName:\s+\[(?P<Applname>.*)];" | stats count by Applname

For the above query below are the results.

Applname       count
abcd                     5
abcd.app            6
efgh                     4
efgh.app            3

Now I want to add 'abcd' count and 'abcd.app' count (5+6), it should show total=11
Same as above 'efgh' count and 'efgh.app' count (4+3); total=7. 

I need to build query for the above total, can anyone guide me on this.

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Do that by normalizing the names before computing the counts.

index="bw6_stg" sourcetype="HYD01"
| rex field=_raw "ApplicationName:\s+\[(?P<Applname>.*)];" 
| eval Applname=mvindex(split(Applname,"."), 0)
| stats count by Applname
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Do that by normalizing the names before computing the counts.

index="bw6_stg" sourcetype="HYD01"
| rex field=_raw "ApplicationName:\s+\[(?P<Applname>.*)];" 
| eval Applname=mvindex(split(Applname,"."), 0)
| stats count by Applname
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...