Splunk Search

how to count commas in a filed and display as table

sivaram520
New Member

I am new to splunk , can some one please help me on below case

my log looks like this
Name="ABCD"
Config Name="XYZ"
dates="2017-01-01,2017-01-02,2017-01-03,2017-01-05,2017-01-07"
missing_dates="2017-01-04,2017-01-06"
Msg="SUCCESS" or "FAIL"

I need to count number of missing dates and display in table table format with below headers only for SUCCESS Msg

Name Config count_of_missing_dates Msg

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Assuming you already have the fields extracted, try this.

... | eval count_of_missing_dates = mvcount(split(missing_dates, ",")) | ...
---
If this reply helps you, an upvote would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Assuming you already have the fields extracted, try this.

... | eval count_of_missing_dates = mvcount(split(missing_dates, ",")) | ...
---
If this reply helps you, an upvote would be appreciated.

DalJeanis
SplunkTrust
SplunkTrust

Or, to be more verbose...

your base search 
| where Msg="SUCCESS" 
| eval count_of_missing_dates = mvcount(split(missing_dates, ",")) 
| table Name Config count_of_missing_dates Msg
0 Karma

sivaram520
New Member

Thank you very much 🙂 it's worked

0 Karma
Get Updates on the Splunk Community!

Improve Your Security Posture

Watch NowImprove Your Security PostureCustomers are at the center of everything we do at Splunk and security ...

Maximize the Value from Microsoft Defender with Splunk

 Watch NowJoin Splunk and Sens Consulting for this Security Edition Tech TalkWho should attend:  Security ...

This Week's Community Digest - Splunk Community Happenings [6.27.22]

Get the latest news and updates from the Splunk Community here! News From Splunk Answers ✍️ Splunk Answers is ...