Splunk Search

Need Help Creating a Nested Stats Table and Grouping by Multiple Values

TheColorBlack
Path Finder

Hey guys,

 

I need some quick help creating a nested stats table and grouping by multiple values within that table. My data contains the following data points that I am trying to correlate / visualize: Client IP Address, Unique Hash ID, Unique Document ID, and the count that shows the number of times an IP Address accessed a Unique Hash ID, and Doc ID.

 

An example data set is:

 

192.168.1.1 (client IP), abcdefg1 (hash 1),  12948(DocID1), 129584(DocID2), 1029384(DocID3)

192.168.1.1(Client IP), abcdefg2 (hash 2), 10294 (DocID 1),

192.168.1.5(Client IP), abcdefg1 (hash1), 12948(DocID1), 1029484(DocID2)

 

I'm looking to create the following table to help visualize these relationships

|

Client IPUnique HashDocument IDCount  
192.168.1.1abcdefg1129485  
  12958410  
  102938415  
      
 abcdefg2129482  
  10294843  
      
192.168.1.5abcdefg1129481  
  10294844  
      

 

I've created nested tables before but I'm really stumping myself on this one. Any advice?

Labels (4)
0 Karma

TheColorBlack
Path Finder

Figured it out, pretty simple but I was doing the operations in the wrong order originally.

 

index="my_custom_index" "properties.requestUri"="http*://my.customwebpage.com:443/api/NotARealEndpoint/*/CoolCars/*" AND NOT "properties.clientIp"="127.0.*.*" AND NOT properties.httpStatusCode=401 |rex field="properties.requestUri" "http(.):\/\/my.customwebpage.com:(\d+)\/api\/NotARealEndpoint\/(?<uniqueHash>[a-zA-z0-9].+[^\/])\/CoolCars\/(?<CarID>[\d].+)"
| stats count by properties.clientIp, uniqueHash, CarID
| stats list(uniqueHash) as UniqueHash, list(CarID) as CarID, list(count) as Count by properties.clientIp
| append [
search index="my_custom_index" "properties.requestUri"="http*://my.customwebpage.com:443/api/NotARealEndpoint/*/CoolCars/*" AND NOT "properties.clientIp"="127.0.*.*" |rex field="properties.requestUri" "http(.):\/\/my.customwebpage.com:(\d+)\/api\/NotARealEndpoint\/(?<uniqueHash>[a-zA-z0-9].+[^\/])\/CoolCars\/(?<CarID>[\d].+)"
| stats count by uniqueHash,CarID
] | table properties.clientIp, UniqueHash, CarID, Count

 

 

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...