Splunk Search

Separate values from multi valued field

Dhruvi
Explorer

I have to write query for extracting out the values from multi valued field

example field: 

Region=America, Africa

Region=Asia

Region=America, Asia

i want table like this:

Region            Count

America             2

Asia                     2

Africa                 1

I have used split cmmnd:

eval temp=split(Region,“,”) 

Now what is happening is it is only giving me count of Asia =1
 

Need little help:)

Labels (1)
0 Karma

to4kawa
Ultra Champion
| makeresults
| eval _raw="Region=America, Africa
Region=Asia
Region=America, Asia"
| multikv noheader=t
| rex max_match=0 "(?<Region>A\w+)"
| table Region
| rename COMMENT as "this is your sample"
| stats count by Region

try stats by

Dhruvi
Explorer

okay it is working well 

 

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Dhruvi ,

you have ro separate values in distinct events and then use stats, something like this:

| makeresults | eval Region="America, Africa"
| append [ | makeresults | eval Region="America, Africa" ]
| append [ | makeresults | eval Region="America" ]
| append [ | makeresults | eval Region="Asia" ]
| makemv delim="," Region
| mvexpand Region
| stats count BY Region

Use the last three rows.

Ciao.

Giuseppe

 

Dhruvi
Explorer

Thanks 🙂 it works as expected 

0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...