Splunk Search

stats count by <Field> : Field value not fully displaying in screen

binurajps
Engager

Below are my log entry 

DateTime=2020-12-16 14:19:01:888 UTC, Type=Orchestrator Event Log, Environment=prod, Thread=[Processor-ENSDelivery-PRODOCSNotification001-5], Logger=com.expedia.www.orchestrator.service.OrchestratorProcessor Message=[Email_TransactionStatus=SUCCESS, OrchestrationStatus=WWW_Template, FallBackStatus=MODULE_BUILDER_FAILED, FallBackReason=LxVirtualCurrencyRefundAmount and LXCreditCardRefundAmount both are null or empty]

This is my splunk query 

index=app splunk_server_group="bexg*" sourcetype=orchestrator-service* NOT "url=/isActive" NOT "Logger=com.netflix.servo.publish.JmxMetricPoller" Email_TransactionStatus FallBackStatus=MODULE_BUILDER_FAILED | stats count by FallBackStatus, FallBackReason

It shows like below

FallBackStatus                                           FallBackReason                                                       Count

MODULE_BUILDER_FAILED                 LxVirtualCurrencyRefundAmount                   1

 

My expected output

FallBackStatus                                           FallBackReason                                                       Count

MODULE_BUILDER_FAILED               LxVirtualCurrencyRefundAmount and LXCreditCardRefundAmount both are null or empty                   1

 

It seems the mentioned case FallBackReason filed value getting cropped.

Labels (1)
0 Karma

binurajps
Engager

Your help much appreciated and it would be great if you can suggest me how can I change my query? 

0 Karma

binurajps
Engager

Thanks for your help. It would be great if you can modify below query

index=app splunk_server_group="bexg*" sourcetype=orchestrator-service* NOT "url=/isActive" NOT "Logger=com.netflix.servo.publish.JmxMetricPoller" Email_TransactionStatus FallBackStatus=MODULE_BUILDER_FAILED | stats count by FallBackStatus, FallBackReason

0 Karma

richgalloway
SplunkTrust
SplunkTrust

You'll have to parse the event yourself.

index=app splunk_server_group="bexg*" sourcetype=orchestrator-service* NOT "url=/isActive" NOT "Logger=com.netflix.servo.publish.JmxMetricPoller" Email_TransactionStatus FallBackStatus=MODULE_BUILDER_FAILED 
| rex "FallBackReason=(?<FallBackReason>[^,]+)"
| stats count by FallBackStatus, FallBackReason
---
If this reply helps you, Karma would be appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

By default, Splunk will parse key=value log formats automatically, but it assume the value field ends at the first space.  The solution (other than modifying the logger) is to use a custom configuration to parse the log.

Start with these props:

[mysourcetype]
TIME_PREFIX = DateTime=
TIME_FORMAT = %Y-%m-%d %H:%M:%S:%3N %Z
MAX_TIMESTAMP_LOOKAHEAD = 27
SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+)
TRANSFORM-parser = mysourcetypeparser

Then in transforms.conf:

[mysourcetypeparser]
REGEX = ([^=]+)=([^,]+)
FORMAT = $1::$2
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...