I have a search that currently has 3 search terms...
host="s2a*" "Command Aborted" OR "Internal queue full" OR "Aborting CMD"
I want to put this into a line chart by number of occurrences returned. One line per search term. Can someone point me in the right direction?
Thanks
 
		
		
		
		
		
	
			
		
		
			
					
		as per answer from Kristian, here is a regex way to do it (considering that an event has only one of those strings).
host="s2a*" "Command Aborted" OR "Internal queue full" OR "Aborting CMD" | rex "(?< myfabulousfield >(Command Aborted|Internal queue full|Aborting CMD))" | stats count by myfabulousfield
 
		
		
		
		
		
	
			
		
		
			
					
		as per answer from Kristian, here is a regex way to do it (considering that an event has only one of those strings).
host="s2a*" "Command Aborted" OR "Internal queue full" OR "Aborting CMD" | rex "(?< myfabulousfield >(Command Aborted|Internal queue full|Aborting CMD))" | stats count by myfabulousfield
 
					
				
		
in the "rex" you meant "regex", right? If "regex" what will be the proper Splunk statement to run your suggested answer? Thanks.
Thanks, that worked just fine. I replaced stats with timechart and it gave me the results I was looking for.
You need to extract the strings above into a field, e.g. my_field
then you run your search like;
... | timechart c by my_field
