Splunk Search

count by wildcard in field value

Toby_r
Loves-to-Learn

Hi,

I've following issue: Ive a dataset containing data like
Order number = 12345
Description = "AB: jdkjsd"
planned_date="12.3.2020"

Order number = 12346
Description = "BC: jdkjsd"
planned_date="12.3.2020"

Order number = 12347
Description = "BA: jdkjsd"
planned_date="12.3.2020"

 

now I'd like to have a table which counts me the number of events for "BC:*", "AB:*" OR "BA:*",... and so on - I'm quite new and google didnt helped me, can someone help? Thanks!

Labels (3)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| rex field=Description "(?<prefix>\w+)\:"
| stats count by prefix
0 Karma
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...