Splunk Search

timechart count by -not a legit field-

mitcanmit
Explorer

Hi,

I want to show the stats based on the different values of the "state" field. "timechart count by result" does not work -probably because the format is not json and splunk fails to understand that "state" is a field. How do I handle this? I have tried rex function but did not manage to get the results I need.

I am trying to get something like this:
success=1231
aborted=322
pending=111

Thanks in advance for the help.

HTTP ***
Headers: [{'Cache-Control',"max-age=0, no-cache"},
          {'Content-Length',"400"},
          {'Content-Type',"application/json;charset=utf-8"},
          {'Host',"***"},
          {'Pragma',"no-cache"},
          {'X-Forwarded-For',"***"}]
Body: [{amount,***},
       {client_reference,"***"},
       {connector,"**"},
       {connector_reference,"***"},
       {consumer_save_card,false},
       {credit_card,[{brand,"***"},
                     {card_number,"**"},
                     {exp_month,***},
                     {exp_year,***},
                     {holder,"***"},
                     {type,"***"}]},
       {currency,"***"},
       {gateway_reference,"***"},
       {state,"success"}]
Tags (1)
0 Karma
1 Solution

tpflicke
Path Finder

The following should do the trick though producing the regular stats output format:

... | rex field=_raw "\{state,\"(?<state>\w*)" | stats count by state | sort -count

or with timechart:

... | rex field=_raw "\{state,\"(?<state>\w*)" | timechart count by state

View solution in original post

tpflicke
Path Finder

The following should do the trick though producing the regular stats output format:

... | rex field=_raw "\{state,\"(?<state>\w*)" | stats count by state | sort -count

or with timechart:

... | rex field=_raw "\{state,\"(?<state>\w*)" | timechart count by state

mitcanmit
Explorer

Thanks a lot!

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...