Splunk Search

Need help with Stats report

lain179
Communicator

I have hundreds of log files containing the following pattern. Basically, I need to create a report for each PROJECTNAME, with the column headers "Filtered", "Missed", "Directories", "New documents", etc.. The column values will be 0, 148, 0, 145, etc.

Following four are just examples - I have about 20 different types, and I need to capture and report the counts per PROJECTNAME. How do I do that?


[A1] Filtered : 0 <1 (12345)> SERVER.PROJECTNAME.Job

[A1] Missed : 148 <1 (12345)> SERVER.PROJECTNAME.Job

[A1] Directories : 0 <1 (12345)> SERVER.PROJECTNAME.Job

[A1] Total time : 0.5 ms <1 (12345)> SERVER.PROJECTNAME.Job


Thanks.

Tags (1)
0 Karma
1 Solution

jharty_splunk
Splunk Employee
Splunk Employee

Are you fields defined? If not you'll have to set your Search time field extractions:

http://docs.splunk.com/Documentation/Splunk/5.0/Knowledge/Addfieldsatsearchtime

If you're not very familiar with regex try using the Interactive Field Extractor:
http://docs.splunk.com/Documentation/Splunk/5.0/Knowledge/Managesearch-timefieldextractions#Review_s...

If the fields are setup just run the search:
| table Filtered, Missed, Directories, New documents

To output to file:
| table Filtered, Missed, Directories, New documents | outputcsv file.csv

View solution in original post

jharty_splunk
Splunk Employee
Splunk Employee

Are you fields defined? If not you'll have to set your Search time field extractions:

http://docs.splunk.com/Documentation/Splunk/5.0/Knowledge/Addfieldsatsearchtime

If you're not very familiar with regex try using the Interactive Field Extractor:
http://docs.splunk.com/Documentation/Splunk/5.0/Knowledge/Managesearch-timefieldextractions#Review_s...

If the fields are setup just run the search:
| table Filtered, Missed, Directories, New documents

To output to file:
| table Filtered, Missed, Directories, New documents | outputcsv file.csv

lain179
Communicator

I am very familiar with Regex. However, if I use regex to extract the pattern, "Filtered", "Missed", "Directories", and other 20+ labels become the values of a field variable rather than the fields themselves.

I can hard code 20+ times in field conf, but I am trying to avoid that if possible.

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...