Splunk Search

Splunk Query to Generate an n-event sample across sourcetypes in an index

JohnEGones
Path Finder

Hi people,

I wonder whether it is possible to run a query that generates a set of n-sample of events for each sourcetype in an index?

In some sense, if the log data has been ingested and conformed properly, this is perhaps not so problematic, you might build a datamodel or just query across the relevant CIM field (alias.)

So lets get specific:

 

index-someIndex sourcetype=someSourceType
| enumerate against some defined key value, say an eventtype
| enumerate all of the eventtypes and pull out any subeventtypes
| list the for 2-5 events for each subeventtype, else just list the 2-5 events for the the eventtype
| table _time, eventtype, subeventtype (NULL if blank), event

 

Labels (4)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| fillnull value="NULL" subeventtype
| streamstats count by eventtype subeventtype
| where count < 6

View solution in original post

0 Karma

JohnEGones
Path Finder

@ITWhisperer 

Thanks. I have not used streamstats  much before. 

I suppose there is not really a good way to generalize this; since simpler queries like this already assume your data is fairly well-parsed.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Correct, you need at least one field to do the stats by.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| fillnull value="NULL" subeventtype
| streamstats count by eventtype subeventtype
| where count < 6
0 Karma
Get Updates on the Splunk Community!

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...

Adoption of Infrastructure Monitoring at Splunk

  Splunk's Growth Engineering team showcases one of their first Splunk product adoption-Splunk Infrastructure ...