<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to create a search to show value of fields as Zero having null values and for numeric exact count? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-show-value-of-fields-as-Zero-having/m-p/652272#M225447</link>
    <description>&lt;P&gt;Need help in creating splunk query to show value of fields as Zero having null values and for numeric it should show exact count.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example -&amp;nbsp;&lt;BR /&gt;I want to search for all the events if all fields having specific keywords I am searching.&lt;/P&gt;
&lt;P&gt;And for the others, if that keyword is not available in that field value , then it should as 0 count&lt;/P&gt;</description>
    <pubDate>Thu, 03 Aug 2023 20:52:46 GMT</pubDate>
    <dc:creator>sahil237888</dc:creator>
    <dc:date>2023-08-03T20:52:46Z</dc:date>
    <item>
      <title>How to create a search to show value of fields as Zero having null values and for numeric exact count?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-show-value-of-fields-as-Zero-having/m-p/652272#M225447</link>
      <description>&lt;P&gt;Need help in creating splunk query to show value of fields as Zero having null values and for numeric it should show exact count.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example -&amp;nbsp;&lt;BR /&gt;I want to search for all the events if all fields having specific keywords I am searching.&lt;/P&gt;
&lt;P&gt;And for the others, if that keyword is not available in that field value , then it should as 0 count&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 20:52:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-show-value-of-fields-as-Zero-having/m-p/652272#M225447</guid>
      <dc:creator>sahil237888</dc:creator>
      <dc:date>2023-08-03T20:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to show value of fields as Zero having null values and for numeric it should show exact count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-show-value-of-fields-as-Zero-having/m-p/652274#M225449</link>
      <description>&lt;P&gt;This is a bit too generic - please can you give some more concrete examples of the events you want to show and the ones you want to hide?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jul 2023 17:50:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-show-value-of-fields-as-Zero-having/m-p/652274#M225449</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-07-27T17:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to show value of fields as Zero having null values and for numeric it should show exact count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-show-value-of-fields-as-Zero-having/m-p/653034#M225650</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp; - Basically my requirement is - I have 50 hosts in host field.&lt;BR /&gt;So, I need to search for count of "error" keyword in my host list.&lt;BR /&gt;If there is a count then it should show the exact count in front of that host , else it should show 0 in parallel to that host.&lt;/P&gt;&lt;P&gt;For, E.g - I run below query -&amp;nbsp;&lt;/P&gt;&lt;P&gt;index=server_data host IN (server1,server2.....server50) "warning_found"&lt;BR /&gt;Then it should show the count of "warning_found" for a specific host. else it should show 0 in parallel to that specific hos&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 09:41:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-show-value-of-fields-as-Zero-having/m-p/653034#M225650</guid>
      <dc:creator>sahil237888</dc:creator>
      <dc:date>2023-08-03T09:41:34Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to show value of fields as Zero having null values and for numeric it should show exact count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-show-value-of-fields-as-Zero-having/m-p/653039#M225652</link>
      <description>&lt;P&gt;It has been said many times before, finding something that doesn't exist is not one of Splunk's strengths.&lt;/P&gt;&lt;P&gt;You could append additional events with zero counts for all the hosts you are interested in, then sum the counts by host.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=server_data host IN (server1,server2.....server50) "warning_found"
| stats count by host
| append
  [| makeresults
  | eval host=split("server1,server2....server50",",")
  | eval count=0]
| stats sum(count) as count by host&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 03 Aug 2023 09:58:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-search-to-show-value-of-fields-as-Zero-having/m-p/653039#M225652</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-08-03T09:58:53Z</dc:date>
    </item>
  </channel>
</rss>

