Quantcast
Channel: Questions in topic: "props.conf"
Viewing all articles
Browse latest Browse all 1485

How to report on the top 10 fields when logs have a variable number of key value pairs that are numeric?

$
0
0
I have log records with a variable number of KV (key value) pairs. Both the field and the values are numeric. The following search parses all of the log records correctly and builds a very long row of results given that there are thousands of potential key values to sum. I have a transforms.conf & props.conf setup [root@splunk local]# cat transforms.conf [get_rule_stat] REGEX = ([0-9]+)=([0-9]+) FORMAT = $1::$2 MV_ADD =true CLEAN_KEYS = false [get_rule_id] REGEX =(?<_KEY_1>[0-9]+)=(?<_VAL_1>[0-9]+) MV_ADD = true CLEAN_KEYS = false -------- [root@splunk local]# cat props.conf [ScoutShield] KV_MODE = multi REPORT-Stats = get_rule_stat REPORT-R-ID = get_rule_id --- source="qa_debug.log" host="splunk.localdomain" sourcetype="ScoutShield" | rex field=_raw "(?ms)(?=[^N]*(?:NetDefender Rule Hits Digest|N.*NetDefender Rule Hits Digest))^(?P[^\\[]+)[^\\]\\n]*\\]\\[(?P[^\\]]+)\\]\\[(?P\\d+)\\]\\[(?P\\d+)[^\\]\\n]*\\]\\[(?P[^\\]]+)" offset_field=_extracted_fields_bounds | rex field=stats max_match=100 "(?\d*=\d*)" |stats sum(*) | addtotals fieldname=TotalHits | rename sum(*) as * What I would like to do is report on the top fields (as in top 10 with largest count) or to do a timechart with only those fields where the fields belong to the top 10. It seems as though I can only use `*` for the field names, and there isn't a way to sub set the names. Any suggestions would be appreciated.

Viewing all articles
Browse latest Browse all 1485

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>