I'd like to display stats based on a custom string within a log entry. Below is sample of the log entry. I'd like to parse the unique entries seen after "The following DAP records were selected for this connection:" string. If possible use the stats by .... method so it displays a unique entry with the amount of times it's been seen. So in the case of the 2 entries below, the stats would have TEST_AUTOMATION_VENDOR, and TEST2_AUTOMATION_VENDOR with a count next to it. I can do this for VPN users quite easily, but can't figure out how to do it for unique results of a string. I only know the basics of splunk search syntax so hopefully I'm explaining this clearly. %ASA-dap-6-734001: DAP: User TESTUSER, Addr 10.10.10.10, Connection AnyConnect: The following DAP records were selected for this connection: TEST_AUTOMATION_VENDOR %ASA-dap-6-734001: DAP: User TESTUSER2, Addr 12.12.12.12, Connection AnyConnect: The following DAP records were selected for this connection: TEST2_AUTOMATION_VENDOR
... View more