Splunk Search

Count identical messages as a total value in the results

seanmylne
New Member

Hi guys,

What i would like to do is display as a count the number of times an identical message is seen in the Message.EventMessage field. If there was only one hit in the logs display 1.

So far my code only shows count = 1 even tough i have multiple identical messages 😞

I would also like to display when the message was last seen in the logs too, but this does not seam to work so have given up on that for now, unless anyone knows how this can be done using what I have pasted below?

Message.EventMessage="* has been flagged *" | stats Count list(Message.EventMessage) AS Name by _time Message.EventMessage | eval "First Seen"=_time | convert timeformat="%H:%M:%S:%3N %d/%m/%Y" ctime("First Seen") | dedup Message.EventMessage| table "First Seen", Name, Count

Thanks
Sean

0 Karma

pradeepkumarg
Influencer
Message.EventMessage=" has been flagged " | stats count first(_time) last(_time) by Message.EventMessage | rename Message.EventMessage as Name
0 Karma
Get Updates on the Splunk Community!

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...