<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: uniq  command usage in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423603#M168452</link>
    <description>&lt;P&gt;Hi @renjith.nair  , thankyou so much for this amazing superfpowerful formula.&lt;BR /&gt;
Can you please just help me on a small stiff. I'm building a timechart for this for last 4 hours.&lt;BR /&gt;
I suppose we are not passing _time field into the query. So, i mvzip _time into time, please review my  query .&lt;/P&gt;

&lt;P&gt;index=idx_    sourcetype IN ("k") component=* &lt;BR /&gt;
| fillnull status-code VALUE="NA" &lt;BR /&gt;
| table transaction-id,logpoint,status-code ,component,_time &lt;BR /&gt;
| stats list(logpoint) as logpoints,list(status-code) as statuscodes,list(_time) as time by transaction-id ,component &lt;BR /&gt;
| eval req_in=mvfind(logpoints, "request-in"),req_out=mvfind(logpoints, "request-out") &lt;BR /&gt;
| eval res=mvzip(logpoints,statuscodes) &lt;BR /&gt;
| eval res=mvzip(res,time) &lt;BR /&gt;
| mvexpand res &lt;BR /&gt;
| table transaction-id,res,req_in,req_out ,component &lt;BR /&gt;
| eval res=split(res,",") &lt;BR /&gt;
| eval logpoint=mvindex(res,0),statuscode=mvindex(res,1) ,time=mvindex(res,2) &lt;BR /&gt;
| fillnull value="NA" &lt;BR /&gt;
| eval platform_failure=if(req_in!="NA" AND req_out=="NA" AND (logpoint=="response-out" AND statuscode=500),"1","0") &lt;BR /&gt;
| where platform_failure="1" &lt;BR /&gt;
| eval _time=time &lt;BR /&gt;
| timechart span=1h count as Count by component&lt;/P&gt;

&lt;P&gt;But this gives just last hour.&lt;BR /&gt;
Do you have any idea ?&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 20:46:54 GMT</pubDate>
    <dc:creator>Mohsin123</dc:creator>
    <dc:date>2020-09-29T20:46:54Z</dc:date>
    <item>
      <title>uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423587#M168436</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;

&lt;P&gt;i have a events based on such a flow :&lt;BR /&gt;
every transaction id has 4 logpoints (logpoint is a field) : &lt;BR /&gt;
request-in , request-out,response-in,response-out&lt;/P&gt;

&lt;P&gt;Can anyone help ?&lt;/P&gt;</description>
      <pubDate>Sat, 07 Jul 2018 13:12:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423587#M168436</guid>
      <dc:creator>Mohsin123</dc:creator>
      <dc:date>2018-07-07T13:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423588#M168437</link>
      <description>&lt;P&gt;Hi @shraddhamuduli,&lt;/P&gt;

&lt;P&gt;Try this. You might need to change the logic in &lt;CODE&gt;if&lt;/CODE&gt; based on your final requirement but the basic logic should work. Lets know if you need further assistance,&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=test sourcetype=trans|table txn_id,logpoint,statuscode
|stats list(logpoint) as logpoints,list(statuscode) as statuscodes by txn_id
|eval req_in=mvfind(logpoints, "Req-in"),req_out=mvfind(logpoints, "Req-Out")| eval res=mvzip(logpoints,statuscodes)
|mvexpand res|table txn_id,res,req_in,req_out
|eval res=split(res,",")|eval logpoint=mvindex(res,0),statuscode=mvindex(res,1)|fields - res|fillnull value="NA"
|eval platform_failure=if(req_in!="NA" AND req_out=="NA" AND (logpoint=="Response-out" AND statuscode=500),"Yes","No")
|eval application_failure=if(((req_in!="NA" AND req_out=="NA") AND (logpoint=="Response-out" AND (match(statuscode,"4*") OR statuscode=500)))
OR ((logpoint=="Response-in" AND statuscode=200) AND (logpoint=="Response-out" AND statuscode=500)),"Yes","No")
|where application_failure="Yes" OR platform_failure="Yes"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Sample data used is &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;1,Req-in,200
1,Req-Out,200
1,Response-in,200
1,Response-out,200
2,Req-in,200
2,Req-Out,200
2,Response-in,200
2,Response-out,200
3,Req-in,200
3,Req-Out,200
3,Response-in,200
3,Response-out,500
4,Req-in,200
4,Response-in,200
4,Response-out,200
5,Req-in,200
5,Req-Out,200
5,Response-in,200
5,Response-out,500
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 08 Jul 2018 05:47:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423588#M168437</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-07-08T05:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423589#M168438</link>
      <description>&lt;P&gt;Try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| makeresults 
| eval raw="1,Req_In,200 1,Req_Out,200 1,Response_In,200 1,Response_Out,200 2,Req_In,200 2,Response_In,200 2,Response_Out,400 3,Req_In,200 3,Req_Out,200 3,Response_In,200 3,Response_Out,500 4,Req_In,200 4,Response_In,200 4,Response_Out,500 5,Req_In,200 5,Req_Out,200 5,Response_In,200 5,Response_Out,500"
| makemv raw
| mvexpand raw
| rex field=raw "^(?&amp;lt;txn_id&amp;gt;[^,]*),(?&amp;lt;logpoInt&amp;gt;[^,]*),(?&amp;lt;statuscode&amp;gt;[^,]*)$"
| streamstats count AS time_offset_seconds
| eval _time = _time + time_offset_seconds
| fields - time_offset_seconds
| rename raw AS _raw

| rename COMMENT AS "EverythIng above generates sample event data; everythIng below is your solution"

| sort 0 _time
| eval {logpoInt} = statuscode
| stats list(*) AS * BY txn_id
| eval Platform_Failure = if((isnotnull(Req_In) AND isnull(Req_Out) AND Response_Out=="500"), "1", "0")
| eval Application_Error = if((isnotnull(Req_In) AND isnull(Req_Out) AND (Response_Out&amp;gt;=400 AND NOT Response_Out=="500")) OR (Reseponse_In=="200" AND Response_Out=="500"), "1", "0")
| multireport 
    [ where Platform_Failure=="1" | stats values(txn_id) count AS Platform_Failure ]
    [ where Application_Error=="1" | stats values(txn_id) count AS Application_Error ]
| fields - txn_id
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 08 Jul 2018 18:50:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423589#M168438</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2018-07-08T18:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423590#M168439</link>
      <description>&lt;P&gt;Hi @shraddhamuduli,&lt;BR /&gt;
Just for clarification, you have accepted the answer and then taken  -2 points. So was there anything missing here ? Or why was it "flagged" ?  Bit confused &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 08:43:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423590#M168439</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-07-11T08:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423591#M168440</link>
      <description>&lt;P&gt;Hi Renjith, Pls delete your answer post, thats what i want ..i am unable to delete this whole post .&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 15:31:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423591#M168440</guid>
      <dc:creator>Mohsin123</dc:creator>
      <dc:date>2018-07-11T15:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423592#M168441</link>
      <description>&lt;P&gt;Why do you want to delete it? If it's not the answer you are looking for , then just "unaccept" it as I dont see any sensitive data in there.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 02:43:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423592#M168441</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-07-12T02:43:35Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423593#M168442</link>
      <description>&lt;P&gt;Hi Renjith, Could you please help me why my failure and error are not showing up in percentage .I'm making a stack bar graph .&lt;/P&gt;

&lt;P&gt;index=idx_apix sourcetype="kafka:topicEvent" &lt;BR /&gt;
| fillnull status-code VALUE="NA" &lt;BR /&gt;
| table transaction-id,logpoint,status-code ,_time&lt;BR /&gt;
| stats list(logpoint) as logpoints,list(status-code) as statuscodes, list(_time) as time by transaction-id &lt;BR /&gt;
| eval req_in=mvfind(logpoints, "request-in"),req_out=mvfind(logpoints, "request-out") &lt;BR /&gt;
| eval res=mvzip(logpoints,statuscodes) &lt;BR /&gt;
| mvexpand res &lt;BR /&gt;
| table transaction-id,res,req_in,req_out ,_time&lt;BR /&gt;
| eval res=split(res,",") &lt;BR /&gt;
| eval logpoint=mvindex(res,0),statuscode=mvindex(res,1) &lt;BR /&gt;
| fillnull value="NA" &lt;BR /&gt;
| eval platform_failure=if(req_in!="NA" AND req_out=="NA" AND (logpoint=="response-out" AND statuscode=500),"Yes","No") &lt;BR /&gt;
| eval application_failure=if( (req_in!="NA" AND req_out=="NA") AND ( (res="response-out,503" OR res="response-out,400" OR res="response-out,401" OR res="response-out,403" OR res="response-out,404" OR res="response-out,405" OR res="response-out,409" OR res="response-out,410" OR res="response-out,412") OR (res="response-in,200" OR res="response-out,500")), "Yes","No") &lt;BR /&gt;
| timechart span=15m count as total, count(eval(platform_failure="Yes")) as Failure , count(eval(application_failure="Yes")) as Error &lt;BR /&gt;
| eval Success=total-(Failure+Error) &lt;BR /&gt;
| eval Success=round((Success/total)*100,2) &lt;BR /&gt;
| eval Failure=round((Failure/total)*100,2) &lt;BR /&gt;
| eval Error=round((Error/total)*100,2) &lt;BR /&gt;
| fields time,Success,Failure,Error&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:28:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423593#M168442</guid>
      <dc:creator>Mohsin123</dc:creator>
      <dc:date>2020-09-29T20:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423594#M168443</link>
      <description>&lt;P&gt;Hi Woodcock&lt;/P&gt;

&lt;P&gt;Could you please help me why my failure and error are not showing up in percentage .I'm making a stack bar graph .&lt;/P&gt;

&lt;P&gt;index=idx_apix sourcetype="kafka:topicEvent" &lt;BR /&gt;
| fillnull status-code VALUE="NA" &lt;BR /&gt;
| table transaction-id,logpoint,status-code ,_time&lt;BR /&gt;
| stats list(logpoint) as logpoints,list(status-code) as statuscodes, list(_time) as time by transaction-id &lt;BR /&gt;
| eval req_in=mvfind(logpoints, "request-in"),req_out=mvfind(logpoints, "request-out") &lt;BR /&gt;
| eval res=mvzip(logpoints,statuscodes) &lt;BR /&gt;
| mvexpand res &lt;BR /&gt;
| table transaction-id,res,req_in,req_out ,_time&lt;BR /&gt;
| eval res=split(res,",") &lt;BR /&gt;
| eval logpoint=mvindex(res,0),statuscode=mvindex(res,1) &lt;BR /&gt;
| fillnull value="NA" &lt;BR /&gt;
| eval platform_failure=if(req_in!="NA" AND req_out=="NA" AND (logpoint=="response-out" AND statuscode=500),"Yes","No") &lt;BR /&gt;
| eval application_failure=if( (req_in!="NA" AND req_out=="NA") AND ( (res="response-out,503" OR res="response-out,400" OR res="response-out,401" OR res="response-out,403" OR res="response-out,404" OR res="response-out,405" OR res="response-out,409" OR res="response-out,410" OR res="response-out,412") OR (res="response-in,200" OR res="response-out,500")), "Yes","No") &lt;BR /&gt;
| timechart span=15m count as total, count(eval(platform_failure="Yes")) as Failure , count(eval(application_failure="Yes")) as Error &lt;BR /&gt;
| eval Success=total-(Failure+Error) &lt;BR /&gt;
| eval Success=round((Success/total)*100,2) &lt;BR /&gt;
| eval Failure=round((Failure/total)*100,2) &lt;BR /&gt;
| eval Error=round((Error/total)*100,2) &lt;BR /&gt;
| fields time,Success,Failure,Error&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:28:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423594#M168443</guid>
      <dc:creator>Mohsin123</dc:creator>
      <dc:date>2020-09-29T20:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423595#M168444</link>
      <description>&lt;P&gt;Are you getting these values after this line &lt;CODE&gt;| timechart span=15m count as total, count(eval(platform_failure="Yes")) as Failure , count(eval(application_failure="Yes")) as Error&lt;/CODE&gt; ? &lt;/P&gt;</description>
      <pubDate>Sun, 15 Jul 2018 12:15:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423595#M168444</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-07-15T12:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423596#M168445</link>
      <description>&lt;P&gt;No Renjith, I'm not receiving nay result. Cant figure out whats  wrong &lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 08:58:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423596#M168445</guid>
      <dc:creator>Mohsin123</dc:creator>
      <dc:date>2018-07-16T08:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423597#M168446</link>
      <description>&lt;P&gt;Ok, then is it possible to find out until which step you are getting data? may be removing the steps one by one.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 09:09:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423597#M168446</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-07-16T09:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423598#M168447</link>
      <description>&lt;P&gt;Hi Renjith,&lt;/P&gt;

&lt;P&gt;I'm receiving data till this :&lt;/P&gt;

&lt;P&gt;index=idx_apix sourcetype="kafka:topicEvent" &lt;BR /&gt;
| fillnull status-code VALUE="NA" &lt;BR /&gt;
| table transaction-id,logpoint,status-code ,_time&lt;BR /&gt;
| stats list(logpoint) as logpoints,list(status-code) as statuscodes, list(_time) as time by transaction-id &lt;BR /&gt;
| eval req_in=mvfind(logpoints, "request-in"),req_out=mvfind(logpoints, "request-out") &lt;BR /&gt;
| eval res=mvzip(logpoints,statuscodes) &lt;BR /&gt;
| mvexpand res &lt;BR /&gt;
| table transaction-id,res,req_in,req_out ,_time&lt;BR /&gt;
| eval res=split(res,",") &lt;BR /&gt;
| eval logpoint=mvindex(res,0),statuscode=mvindex(res,1) &lt;BR /&gt;
| fillnull value="NA" &lt;BR /&gt;
| eval platform_failure=if(req_in!="NA" AND req_out=="NA" AND (logpoint=="response-out" AND statuscode=500),"Yes","No") &lt;BR /&gt;
| eval application_failure=if( (req_in!="NA" AND req_out=="NA") AND ( (res="response-out,503" OR res="response-out,400" OR res="response-out,401" OR res="response-out,403" OR res="response-out,404" OR res="response-out,405" OR res="response-out,409" OR res="response-out,410" OR res="response-out,412") OR (res="response-in,200" OR res="response-out,500")), "Yes","No")&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:29:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423598#M168447</guid>
      <dc:creator>Mohsin123</dc:creator>
      <dc:date>2020-09-29T20:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423599#M168448</link>
      <description>&lt;P&gt;Hi Renjith , does it work?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 09:57:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423599#M168448</guid>
      <dc:creator>Mohsin123</dc:creator>
      <dc:date>2018-07-16T09:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423600#M168449</link>
      <description>&lt;P&gt;I didnt get what you mean but what is suggested is , execute your search parts by parts and see where the data is missing , for eg.&lt;/P&gt;

&lt;P&gt;first run &lt;CODE&gt;index=idx_apix sourcetype="kafka:topicEvent"&lt;/CODE&gt; and if you get result, then add &lt;CODE&gt;| fillnull status-code VALUE="NA"&lt;/CODE&gt; and then &lt;CODE&gt;| table transaction-id,logpoint,status-code ,_time&lt;/CODE&gt; and so on ...until you dont get result. Then you could identify which step is not resulting data and troubleshoot&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 10:04:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423600#M168449</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-07-16T10:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423601#M168450</link>
      <description>&lt;P&gt;Hi Renjith , till the code before using timechart , my results are coming up fine , like platform-failure=yes or application-failure=no&lt;/P&gt;

&lt;P&gt;now i'm trying to count(platform-failure=yes) as failure &lt;BR /&gt;
count (application-failure=yes) as error&lt;BR /&gt;
and rest as success i.e success=total-(error+failure)&lt;/P&gt;

&lt;P&gt;and take percentage of success, error and failure and display in a stacked bar graph&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 10:09:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423601#M168450</guid>
      <dc:creator>Mohsin123</dc:creator>
      <dc:date>2018-07-16T10:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423602#M168451</link>
      <description>&lt;P&gt;Hi Woodcock ,&lt;/P&gt;

&lt;P&gt;Good morning.&lt;BR /&gt;
Multireport is somehow not working . It displays results for the first pipe i.e platform failure but doesnt show any value for the second pipe application failure&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jul 2018 08:16:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423602#M168451</guid>
      <dc:creator>Mohsin123</dc:creator>
      <dc:date>2018-07-17T08:16:16Z</dc:date>
    </item>
    <item>
      <title>Re: uniq  command usage</title>
      <link>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423603#M168452</link>
      <description>&lt;P&gt;Hi @renjith.nair  , thankyou so much for this amazing superfpowerful formula.&lt;BR /&gt;
Can you please just help me on a small stiff. I'm building a timechart for this for last 4 hours.&lt;BR /&gt;
I suppose we are not passing _time field into the query. So, i mvzip _time into time, please review my  query .&lt;/P&gt;

&lt;P&gt;index=idx_    sourcetype IN ("k") component=* &lt;BR /&gt;
| fillnull status-code VALUE="NA" &lt;BR /&gt;
| table transaction-id,logpoint,status-code ,component,_time &lt;BR /&gt;
| stats list(logpoint) as logpoints,list(status-code) as statuscodes,list(_time) as time by transaction-id ,component &lt;BR /&gt;
| eval req_in=mvfind(logpoints, "request-in"),req_out=mvfind(logpoints, "request-out") &lt;BR /&gt;
| eval res=mvzip(logpoints,statuscodes) &lt;BR /&gt;
| eval res=mvzip(res,time) &lt;BR /&gt;
| mvexpand res &lt;BR /&gt;
| table transaction-id,res,req_in,req_out ,component &lt;BR /&gt;
| eval res=split(res,",") &lt;BR /&gt;
| eval logpoint=mvindex(res,0),statuscode=mvindex(res,1) ,time=mvindex(res,2) &lt;BR /&gt;
| fillnull value="NA" &lt;BR /&gt;
| eval platform_failure=if(req_in!="NA" AND req_out=="NA" AND (logpoint=="response-out" AND statuscode=500),"1","0") &lt;BR /&gt;
| where platform_failure="1" &lt;BR /&gt;
| eval _time=time &lt;BR /&gt;
| timechart span=1h count as Count by component&lt;/P&gt;

&lt;P&gt;But this gives just last hour.&lt;BR /&gt;
Do you have any idea ?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:46:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/uniq-command-usage/m-p/423603#M168452</guid>
      <dc:creator>Mohsin123</dc:creator>
      <dc:date>2020-09-29T20:46:54Z</dc:date>
    </item>
  </channel>
</rss>

