Splunk Search

Why is my current stats search not producing any results?

syed_star357
New Member

Hi,

Can anyone tell me why this comment is not working? I have all the mentioned fields in my data, but when I add stats max(_time) as last_time by host,sourcetype,action,dest,dest_ip,dest_port,dev,index,msg,src,src_ip,src_port,vendor_action |dedup last_time,host,sourcetype,action,dest,dest_ip,dest_port,dev,index,msg,src,src_ip,src_port,vendor_action
I'm not getting any result. Here is my full search:

src=122.15.158.173 sourcetype=cisco:asa "Deny*" |stats max(_time) as last_time by host,sourcetype,action,dest,dest_ip,dest_port,dev,index,msg,src,src_ip,src_port,vendor_action |dedup last_time,host,sourcetype,action,dest,dest_ip,dest_port,dev,index,msg,src,src_ip,src_port,vendor_action
0 Karma
1 Solution

javiergn
Super Champion

Two things:

  • You don't need the dedup afterwards because you are already summarising with stats
  • If any of the fields in the stats group by clause does not exist or is empty you are going to have problems.

Try this first to see if the are any events matching your requirements with data in all the required fields:

src=122.15.158.173 sourcetype=cisco:asa "Deny*" 
    host=* 
    sourcetype=*
    action=* 
    dest=* 
    dest_ip=* 
    dest_port=* 
    dev=* 
    index=* 
    msg=* 
    src=* 
    src_ip=* 
    src_port=* 
    vendor_action=* 

If that works then append the stats afterwards:

| stats max(_time) as last_time by host, sourcetype, action, dest, dest_ip, dest_port, dev, index, msg, src, src_ip, src_port, vendor_action

View solution in original post

inventsekar
SplunkTrust
SplunkTrust

as i checked, "sourcetype=cisco:asa" events are not having a field "dev"

tried it without "dev" and its working fine..
src=122.15.158.173 sourcetype=cisco:asa "Deny*"|stats max(_time) as last_time by host,sourcetype,action,dest,dest_ip,dest_port,index,msg,src,src_ip,src_port,vendor_action |dedup last_time,host,sourcetype,action,dest,dest_ip,dest_port,index,msg,src,src_ip,src_port,vendor_action

thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !
0 Karma

syed_star357
New Member

No, it has Dev field.

0 Karma

inventsekar
SplunkTrust
SplunkTrust

oh ok. i thought cisco:asa logs may have same format. seems your environment is different. ok, thanks.

thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !
0 Karma

javiergn
Super Champion

Two things:

  • You don't need the dedup afterwards because you are already summarising with stats
  • If any of the fields in the stats group by clause does not exist or is empty you are going to have problems.

Try this first to see if the are any events matching your requirements with data in all the required fields:

src=122.15.158.173 sourcetype=cisco:asa "Deny*" 
    host=* 
    sourcetype=*
    action=* 
    dest=* 
    dest_ip=* 
    dest_port=* 
    dev=* 
    index=* 
    msg=* 
    src=* 
    src_ip=* 
    src_port=* 
    vendor_action=* 

If that works then append the stats afterwards:

| stats max(_time) as last_time by host, sourcetype, action, dest, dest_ip, dest_port, dev, index, msg, src, src_ip, src_port, vendor_action
Get Updates on the Splunk Community!

AppDynamics Summer Webinars

This summer, our mighty AppDynamics team is cooking up some delicious content on YouTube Live to satiate your ...

SOCin’ it to you at Splunk University

Splunk University is expanding its instructor-led learning portfolio with dedicated Security tracks at .conf25 ...

Credit Card Data Protection & PCI Compliance with Splunk Edge Processor

Organizations handling credit card transactions know that PCI DSS compliance is both critical and complex. The ...