Dashboards & Visualizations

Recover fields after stats

marco_massari11
Communicator

Hi,

I have a first dashboard with this query:

index=ind  hostname=* (cat_name=success OR cat_name=failed) service=*
| eval site=substr(DeviceName,1,7) + substr(DeviceName, -4)
| stats values(cat_name) as status by mac service site
| where mvcount(status)=1 and status="failed" and service="x"
| dedup mac
| stats count by site

In the result I have a count of only "failed" by site. If I click on a count, I go to another dashboard that shows some informations for the specific site. This is the second dashboard query:


index=ind  hostname=* (cat_name=success OR cat_name=failed) service=*
| eval site=substr(DeviceName,1,7) + substr(DeviceName, -4)
| stats values(cat_name) as status by mac service site
| where mvcount(status)=1 and status="failed" and service="x"
| dedup mac
| search site="$token$"
| dedup mac  
| table site mac status ip dest

The problem is that I have not results for ip and dest, I think beacause I lost them after stats command. Can you help me???

 

Thanks in advance

Labels (5)
0 Karma
1 Solution

t_shreya
Path Finder

@marco_massari11 , can you try using eventstats instead of stats?

View solution in original post

t_shreya
Path Finder

@marco_massari11 , can you try using eventstats instead of stats?

marco_massari11
Communicator

@t_shreya  It works!!!

Thank you so much

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...