<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: can't get a field to appear when using stats in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77548#M181557</link>
    <description>&lt;P&gt;well. no. &lt;BR /&gt;
Your indexed events contain information that can be parsed into fields (like vid, url etc). That never changes.&lt;/P&gt;

&lt;P&gt;On top of that, you can use commands like eval or eventstats which will create new fields to your events. These only exist in the search you are running, and do not alter the indexed data.&lt;/P&gt;

&lt;P&gt;To further confuse this, certain types of command - like stats, chart, transaction etc - will change the concept of "event" for the search you are running, i.e. after a chart command, each row is considered an event, which can be written out or acted upon further.&lt;/P&gt;

&lt;P&gt;Makes sense?&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
    <pubDate>Fri, 04 Jan 2013 09:50:39 GMT</pubDate>
    <dc:creator>kristian_kolb</dc:creator>
    <dc:date>2013-01-04T09:50:39Z</dc:date>
    <item>
      <title>can't get a field to appear when using stats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77544#M181553</link>
      <description>&lt;P&gt;A have a ...| selfjoin subsearch which joins on two fields id, vid.  I then pass the fields I want kept to my main search via | fields + id + vid + url. My main search looks for all errors which will only contain the url field not the id and vid fields but it seems since I'm doing a stats my id and vid fields are not populated in the resulting table... help.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2013 21:05:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77544#M181553</guid>
      <dc:creator>tb5821</dc:creator>
      <dc:date>2013-01-03T21:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: can't get a field to appear when using stats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77545#M181554</link>
      <description>&lt;P&gt;more information needed. submit sample events, with further explanation if necessary. also, please describe your desired output.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2013 21:16:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77545#M181554</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-01-03T21:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: can't get a field to appear when using stats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77546#M181555</link>
      <description>&lt;P&gt;The only fields &lt;CODE&gt;stats&lt;/CODE&gt; passes on to the rest of the search pipeline are the ones involved in the stats calculation. So for instance &lt;CODE&gt;stats count by id,vid,url&lt;/CODE&gt; will only give you the fields count, id, vid and url.&lt;/P&gt;

&lt;P&gt;If you want to calculate stats but still have access to fields, you could look into using &lt;CODE&gt;eventstats&lt;/CODE&gt; instead. It calculates stats and writes them on a per-event basis, so other fields will not be removed.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2013 21:27:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77546#M181555</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-01-03T21:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: can't get a field to appear when using stats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77547#M181556</link>
      <description>&lt;P&gt;Hmm, so my other fields when using either eventstats or stats show up for a few seconds assuming until the search is done and then they go away... thoughts?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2013 22:59:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77547#M181556</guid>
      <dc:creator>tb5821</dc:creator>
      <dc:date>2013-01-03T22:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: can't get a field to appear when using stats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77548#M181557</link>
      <description>&lt;P&gt;well. no. &lt;BR /&gt;
Your indexed events contain information that can be parsed into fields (like vid, url etc). That never changes.&lt;/P&gt;

&lt;P&gt;On top of that, you can use commands like eval or eventstats which will create new fields to your events. These only exist in the search you are running, and do not alter the indexed data.&lt;/P&gt;

&lt;P&gt;To further confuse this, certain types of command - like stats, chart, transaction etc - will change the concept of "event" for the search you are running, i.e. after a chart command, each row is considered an event, which can be written out or acted upon further.&lt;/P&gt;

&lt;P&gt;Makes sense?&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2013 09:50:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77548#M181557</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-01-04T09:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: can't get a field to appear when using stats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77549#M181558</link>
      <description>&lt;P&gt;Makes sense but still doesn't explain my issue.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2013 14:00:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77549#M181558</guid>
      <dc:creator>tb5821</dc:creator>
      <dc:date>2013-01-04T14:00:53Z</dc:date>
    </item>
    <item>
      <title>Re: can't get a field to appear when using stats</title>
      <link>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77550#M181559</link>
      <description>&lt;P&gt;Please clarify what you mean by that they "show up" and "go away"? I'm pretty confident that fields will not just go away at the end of a search, ever.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2013 16:12:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/can-t-get-a-field-to-appear-when-using-stats/m-p/77550#M181559</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-01-04T16:12:48Z</dc:date>
    </item>
  </channel>
</rss>

