Hello,
I'm a Splunk novice and appreciate your patience. I'm trying to figure out how to display all of the fields listed in my search, but there is only data in the table in the one field specified in the |stats count by field3. Here is my search:
index=myindex field1="TY" field2="G"
|stats count by field3 where count >5
|fields + _time host field1 field2 field3 field4 field5
|table _time host field1 field2 field3 field4 field5
I appreciate any help, tips, or tricks!
That is exactly why eventstats
exists. It performs the analysis of stats
and sticks the answers not on a new summary but sprinkled throughout the starting events. Just switch from stats
to eventstats
.
Thank you so much for your help! I am learning every day, for sure!
I just learned that I should upvote. Sorry about that. Not trying to be rude; just a newbie. 😉
That is exactly why eventstats
exists. It performs the analysis of stats
and sticks the answers not on a new summary but sprinkled throughout the starting events. Just switch from stats
to eventstats
.
The stats
command is a filtering command. That means the only fields available downstream are those mentioned in stats
. In your example, only 'count' and 'field3' are available. The fields
command cannot put back what stats
takes out.
For an alternative, look at the streamstats
command, which adds fields to events rather than remove fields.