Dashboards & Visualizations

0 instead empty

jip31jip31
Explorer

hi

i use this request in a Dashboard
but when the result = 0 i dont have 0 displaying but Nothing
i would like to ,have 0
how to do please?
thanks

index="*" DisplayName="PCServicesWinSrv" Started="false" State="Stopped" | dedup host | stats count by DisplayName | eventstats sum(count) as Total | eval percent=round((count/Total)*100,1) | eval DisplayName=DisplayName."(count: ".count.", percent: ".percent.")" | table count

Tags (1)
0 Karma
1 Solution

krishnab
Path Finder

Hi it is simple try this,

your search
| eval count=if(isnull(count),"0",count)
| table count

View solution in original post

0 Karma

jip31
Motivator

thank you very much

0 Karma

jip31
Motivator

thanks a lot!!!!!!

0 Karma

niketn
Legend

@jip31 if one of the answers has helped you, please do not forget to accept the same to mark this question as answered!

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

Sukisen1981
Champion

Splunk gives you the fillnull function to do this instead of writing an eval statement(which also should work) -

your search | fillnull value=0 count
0 Karma

krishnab
Path Finder

Hi it is simple try this,

your search
| eval count=if(isnull(count),"0",count)
| table count

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...