Splunk Search

how to count records in a row?

Pikta
Explorer

Hello guys, I am new with a splunk and i need some help (also a splunk search language documentation with example).

My search row is

 index=waf source="waf_events" | stats count by remote_addr, msg | mvcombine msg
As a result I  have a row: 
IP address       rule name                                                                  count

192.168.1.1    Anomally connection                                            1

                            Bad user name  

 

It show IP address and rules name, that IP address broke rules and a count of IP address, But i want, that  it will show a rule count. Something like this: 

192.168.1.1   Anomally connection, Bad user name    2 (two rules)

Labels (2)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @Pikta,

about Splunk Search documentation, you can see at https://docs.splunk.com/Documentation/Splunk/8.1.3/SearchTutorial/WelcometotheSearchTutorial and https://www.splunk.com/en_us/training/free-courses/splunk-fundamentals-1.html

About your need, you can add the dc (distinct count) option to have the number of rules, something like this:

index=waf source="waf_events" 
| stats values(rule_names) AS rulenames dc(rule_names) AS dc_rulenames by remote_addr

For more infos see at https://docs.splunk.com/Documentation/Splunk/8.1.3/SearchReference/Stats or https://www.tutorialspoint.com/splunk/splunk_stats_command.htm#:~:text=The%20stats%20command%20is%20...

Ciao.

Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi @Pikta,

about Splunk Search documentation, you can see at https://docs.splunk.com/Documentation/Splunk/8.1.3/SearchTutorial/WelcometotheSearchTutorial and https://www.splunk.com/en_us/training/free-courses/splunk-fundamentals-1.html

About your need, you can add the dc (distinct count) option to have the number of rules, something like this:

index=waf source="waf_events" 
| stats values(rule_names) AS rulenames dc(rule_names) AS dc_rulenames by remote_addr

For more infos see at https://docs.splunk.com/Documentation/Splunk/8.1.3/SearchReference/Stats or https://www.tutorialspoint.com/splunk/splunk_stats_command.htm#:~:text=The%20stats%20command%20is%20...

Ciao.

Giuseppe

Pikta
Explorer

Hello, @gcusello ,  Thank for a solution. Another question:

Now I want to create a custom alert, that a splunk will send me an email when a rule count is more than 3. I tried to write in "Trigger alert when" many variations, but no one works. The last one was  "search dc(rule_names) > 2" But I am getting an email event then when dc(rule_name)=1

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Pikta,

this is another question and, next time, please, open a new question.

Anyway, you have to put the threeshold in the search, something like this:

index=waf source="waf_events" 
| stats values(rule_names) AS rulenames dc(rule_names) AS dc_rulenames by remote_addr
| where dc_rulenames>3

Ciao.

Giuseppe

0 Karma

Pikta
Explorer

Pikta_0-1619011375356.png

I had this one , when I wrote, that I want to get an alert to my email, when rules count is more than 3.

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Pikta,

if you use the threeshold in the search, the condition to put in the alert is "Number of Results is greather than 0".

gcusello_0-1619013853636.png

Ciao.

Giuseppe

Pikta
Explorer

thanks one more time

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Pikta,

good for you, see next time.

Ciao and happy splunking.

Giuseppe

P.S.: Karma Points are appreciated 😉

Tags (1)
0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...