Splunk Search

Regex multiple fields extraction and graph

nirt
Path Finder

Hi All,
I have a website which produces statistics and it is shown like this(over 1K lines, so just pasting a few)
Each line is produced for each server(e.g there are 2/3 servers) which are seperated by
:

<3>
null

<2>
RealDBMisc.aborted.hod.-1.number = 0
RealDBMisc.aborted.hod.-1.total = 0
RealDBMisc.aborted.hod.-1.avarage = 0
UserDBMisc.aborted.hod.-1.number = 0
UserDBMisc.aborted.hod.-1.avarage = 0
UserDBMisc.aborted.hod.-1.total = 0
ipc.Routing.RouteCostRequest.success.hod.-1.total = 15204
ipc.vs-changeVenueProduct.success.hod.-1.number = 82


The statistics are for the past hour, so the collection is also per hour
I'm looking for a regex syntax to help me filter fields and create graphs, for example I want a graph to show me the numbers after UserDBMisc.aborted.hod.-1.avarage for a custom time

Thanks in advance

Tags (2)
0 Karma

ayme
Splunk Employee
Splunk Employee

Something like this?:

sourcetype=yourdata | rex max_match=99999 field=your_field_holding_all_values "(?<yourfield>[^\n]+)"  | mvexpand yourfield | search yourfield="ipc.DDBRemoveCache.alerts.success.hod.-1.total*" | rex field=yourfield "(?P<field>[^\=]+)=(?P<value>.*)" | table field, value
0 Karma

sandeep_at_func
Explorer

I'm a little fuzzy on understanding this one, is that one event? It might help (me and others) to see what three events would like like from this source. I'm sure we can figure it out 🙂

0 Karma

nirt
Path Finder

Small correction:
I have a source that gives a lot of statistic information, each line is different content
for example:
pc.DDBRemoveCache.alerts.success.hod.-1.total = 527
ipc.DDBRemoveCache.alerts.success.hod.-1.avarage = 1
ipc.DDBRemoveCache.alerts.success.hod.-1.number = 527
ipc.DDBUpdateCache.alerts.success.hod.-1.number = 161
ipc.DDBUpdateCache.alerts.success.hod.-1.total = 161
ipc.DDBUpdateCache.alerts.success.hod.-1.avarage = 1

so it's quite simple: name = value
but I can't seem to get the regex properly working

0 Karma

nirt
Path Finder

One event gives out over 1000 lines of data, each line is a statistic event, however those events can be in multiple servers(divided by the such as <2>)
I need somehow to tell Splunk to know those fields so I can create graphs on each field as I wish

Thanks

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...