<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using tstats to extract first element in multivalue field in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Using-tstats-to-extract-first-element-in-multivalue-field/m-p/414164#M119339</link>
    <description>&lt;P&gt;Hi @BarnesLeo,&lt;/P&gt;

&lt;P&gt;Can you please try the following search?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=YOUR_INDEX | rename project_sources{}.scmEvent.message as project_sources_message, project_sources{}.scmEvent.sha as source_sha 
| eval temp = mvzip(project_sources_message,source_sha) 
| stats count by _time temp 
| eval project_sources_message=mvindex(split(temp,","),0),source_sha=mvindex(split(temp,","),1) 
| stats sum(count) as count by project_sources_message source_sha
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;My Sample Search:&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| makeresults 
| eval _raw="{\"project_sources\": [{\"scmEvent\": {\"message\": \"message1\",\"sha\": \"xxxxxx\"} },{\"scmEvent\": {\"message\": \"message2\",\"sha\": \"yyyyyyy\"} ] }" 
| append 
    [| makeresults 
    | eval _raw="{\"project_sources\": [{\"scmEvent\": {\"message\": \"message1\",\"sha\": \"xxxxxx\"} },{\"scmEvent\": {\"message\": \"message3\",\"sha\": \"zzzzzz\"} ] }"] 
| kv 
| rename project_sources{}.scmEvent.message as project_sources_message, project_sources{}.scmEvent.sha as source_sha 
| eval temp = mvzip(project_sources_message,source_sha) 
| stats count by _time temp 
| eval project_sources_message=mvindex(split(temp,","),0),source_sha=mvindex(split(temp,","),1) 
| stats sum(count) as count by project_sources_message source_sha
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;THanks&lt;/P&gt;</description>
    <pubDate>Fri, 17 Aug 2018 10:00:18 GMT</pubDate>
    <dc:creator>kamlesh_vaghela</dc:creator>
    <dc:date>2018-08-17T10:00:18Z</dc:date>
    <item>
      <title>Using tstats to extract first element in multivalue field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-tstats-to-extract-first-element-in-multivalue-field/m-p/414163#M119338</link>
      <description>&lt;P&gt;I have a field that looks something like this in the event viewer:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;project_sources: [
    {
        scmEvent: {
            message: message1
            sha: xxxxxx
            ......
    }
    {
        scmEvent: {
            message: message2
            sha: yyyyyyy
            ......
    }
]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;My end goal is to extract &lt;CODE&gt;scmEvent.sha&lt;/CODE&gt; for the first element in the &lt;CODE&gt;sources&lt;/CODE&gt; array as efficiently as possible. Can I do that somehow with &lt;CODE&gt;tstats&lt;/CODE&gt;?&lt;/P&gt;

&lt;P&gt;These two queries give me the same results:&lt;BR /&gt;
1. &lt;CODE&gt;index=myIndex | stats count by project_sources{}.scmEvent.message, sources{}.scmEvent.sha&lt;/CODE&gt;&lt;BR /&gt;
2. &lt;CODE&gt;| tstats count where index=myIndex by project_sources{}.scmEvent.message, sources{}.scmEvent.sha&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;For these cases I will get a table with something like this:&lt;BR /&gt;
message1 xxxxx 30&lt;BR /&gt;
message1 yyyyy 30&lt;BR /&gt;
message2 xxxxx 30&lt;BR /&gt;
message2 yyyyy 30&lt;/P&gt;

&lt;P&gt;So it seems like the stats commands are counting all combinations of fields in element 0 and element 1 of sources.&lt;/P&gt;

&lt;P&gt;Can I extract only one of the elements using &lt;CODE&gt;tstats&lt;/CODE&gt;?&lt;BR /&gt;
(This may be a trivial thing to do, but I still haven't fully grasped how fields that are dictionaries/arrays work.)&lt;/P&gt;</description>
      <pubDate>Thu, 16 Aug 2018 21:11:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-tstats-to-extract-first-element-in-multivalue-field/m-p/414163#M119338</guid>
      <dc:creator>BarnesLeo</dc:creator>
      <dc:date>2018-08-16T21:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: Using tstats to extract first element in multivalue field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-tstats-to-extract-first-element-in-multivalue-field/m-p/414164#M119339</link>
      <description>&lt;P&gt;Hi @BarnesLeo,&lt;/P&gt;

&lt;P&gt;Can you please try the following search?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=YOUR_INDEX | rename project_sources{}.scmEvent.message as project_sources_message, project_sources{}.scmEvent.sha as source_sha 
| eval temp = mvzip(project_sources_message,source_sha) 
| stats count by _time temp 
| eval project_sources_message=mvindex(split(temp,","),0),source_sha=mvindex(split(temp,","),1) 
| stats sum(count) as count by project_sources_message source_sha
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;My Sample Search:&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| makeresults 
| eval _raw="{\"project_sources\": [{\"scmEvent\": {\"message\": \"message1\",\"sha\": \"xxxxxx\"} },{\"scmEvent\": {\"message\": \"message2\",\"sha\": \"yyyyyyy\"} ] }" 
| append 
    [| makeresults 
    | eval _raw="{\"project_sources\": [{\"scmEvent\": {\"message\": \"message1\",\"sha\": \"xxxxxx\"} },{\"scmEvent\": {\"message\": \"message3\",\"sha\": \"zzzzzz\"} ] }"] 
| kv 
| rename project_sources{}.scmEvent.message as project_sources_message, project_sources{}.scmEvent.sha as source_sha 
| eval temp = mvzip(project_sources_message,source_sha) 
| stats count by _time temp 
| eval project_sources_message=mvindex(split(temp,","),0),source_sha=mvindex(split(temp,","),1) 
| stats sum(count) as count by project_sources_message source_sha
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;THanks&lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 10:00:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-tstats-to-extract-first-element-in-multivalue-field/m-p/414164#M119339</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2018-08-17T10:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: Using tstats to extract first element in multivalue field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-tstats-to-extract-first-element-in-multivalue-field/m-p/414165#M119340</link>
      <description>&lt;P&gt;Thanks for the answer, but this misses the point of the question. I know I can get the query to do what I want with &lt;CODE&gt;mvzip&lt;/CODE&gt; or &lt;CODE&gt;spath&lt;/CODE&gt; before using &lt;CODE&gt;stats&lt;/CODE&gt;. The question is how to do it with &lt;CODE&gt;tstats&lt;/CODE&gt; since I want maximum performance.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Aug 2018 00:26:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-tstats-to-extract-first-element-in-multivalue-field/m-p/414165#M119340</guid>
      <dc:creator>BarnesLeo</dc:creator>
      <dc:date>2018-08-18T00:26:42Z</dc:date>
    </item>
  </channel>
</rss>

