I have put few IP's in the filter and have created filed for those IP's but when they die in the statistics not returning as zero rather its showing nothing, its showing only the IP's that has count. Please advise. Please find the below search and attached screenshot.
It shows only the filed has value. Not showing as zero event count the fields does not have events.
index=blu cs_host="collector*.abc.com" c_ip=10.xx.xx.233 OR c_ip=10.xx.xx.234 OR c_ip=10.xx.xx.248 OR c_ip=10.xx.xx.250 OR c_ip=10.xx.xx.42 OR c_ip=10.xx.xx.43
|stats count by c_ip|fillnull
@sathiyasun ,
Try adding this to your search
|appendpipe [|stats count|where count=0]
ie.
index=blu cs_host="collector*.abc.com" c_ip=10.xx.xx.233 OR c_ip=10.xx.xx.234 OR c_ip=10.xx.xx.248 OR c_ip=10.xx.xx.250 OR c_ip=10.xx.xx.42 OR c_ip=10.xx.xx.43
|stats count by c_ip|appendpipe [|stats count|where count=0]
Appendcols solution will work only if you dont have any events and show results as 0. If you want to show the IPs which does not have any events, then probably you should add a static list of IPs which you want to see using lookup or directly in the search and compare it against the events.
something similar to https://answers.splunk.com/answers/694862/using-a-lookup-table-how-do-you-compare-a-list-to.html