Dashboards & Visualizations

Recover fields after stats

marco_massari11
Communicator

Hi,

I have a first dashboard with this query:

index=ind  hostname=* (cat_name=success OR cat_name=failed) service=*
| eval site=substr(DeviceName,1,7) + substr(DeviceName, -4)
| stats values(cat_name) as status by mac service site
| where mvcount(status)=1 and status="failed" and service="x"
| dedup mac
| stats count by site

In the result I have a count of only "failed" by site. If I click on a count, I go to another dashboard that shows some informations for the specific site. This is the second dashboard query:


index=ind  hostname=* (cat_name=success OR cat_name=failed) service=*
| eval site=substr(DeviceName,1,7) + substr(DeviceName, -4)
| stats values(cat_name) as status by mac service site
| where mvcount(status)=1 and status="failed" and service="x"
| dedup mac
| search site="$token$"
| dedup mac  
| table site mac status ip dest

The problem is that I have not results for ip and dest, I think beacause I lost them after stats command. Can you help me???

 

Thanks in advance

Labels (5)
0 Karma
1 Solution

t_shreya
Path Finder

@marco_massari11 , can you try using eventstats instead of stats?

View solution in original post

t_shreya
Path Finder

@marco_massari11 , can you try using eventstats instead of stats?

marco_massari11
Communicator

@t_shreya  It works!!!

Thank you so much

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...