Splunk Search

Splunk Search regex

avsplunkuser007
Engager

Hello, 

My first post!!!

I have a bunch of results that show up when searched. One of the example is 

Aug 5 19:08:12 ServerName Aug 5, 2020 19:08:12 GMT|50000|APP|UNKNOWN|XXX.XXX.XXX.XXX|XXX.XXX.XXX.XXX|XXX.XXX.XXX.XXX|443|XXXXX|-|/someprocess.php|-|A message posted successfully|500 

Aug 5 19:08:10 ServerName Aug 5, 2020 19:08:10 GMT|50000|APP|UNKNOWN|XXX.XXX.XXX.XXX|XXX.XXX.XXX.XXX|XXX.XXX.XXX.XXX|443|XXXXX|-|/newprocess.php|-|A message posted successfully|200

I want to do a stats count by the .php processes. So, how do i add these or eval/stats these .php processes / scripts ? 

Labels (6)
0 Karma

Anam
Community Manager
Community Manager

Welcome to Splunk Answers! avesplunkuser007 We have some awesome contributors who help out users actively. Feel free to message me if you have any questions or concerns.

0 Karma

thambisetty
SplunkTrust
SplunkTrust

The events look like very much structured and values are delimited with pipe symbol.

you can use IFX(Interactive Field Extraction) to extract them very nicely.

https://docs.splunk.com/Documentation/Splunk/8.0.5/Knowledge/ExtractfieldsinteractivelywithIFX

————————————
If this helps, give a like below.

isoutamo
SplunkTrust
SplunkTrust

And adding more Splunk features here, you could do this with props.conf and transforms.conf on search heads on search time ,-)

All these suggestions  will work, it's your chose to select which own is best for your current needs.

r. Ismo

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Welcome!

To do stats on the field you first need to extract it.  The rex command does that.

index=foo
| rex "\/(?<file>\w+\.\w+)"
| stats count by file

 

---
If this reply helps you, Karma would be appreciated.

ITWhisperer
SplunkTrust
SplunkTrust

It looks like the script name is the 11th field assuming "|" is the delimiter so something like this might work

... base search ...
| eval logmessage=_raw
| makemv delim="|" logmessage
| eval script=mvindex(logmessage,10)
| stats count by script

Indexes start at zero so index 10 for the 11th field 

Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...