Splunk Cloud Platform

Single value for specific field

usmsplunksme
Explorer

HI fellow splunkers,

I am trying to count a distinct number of applications from our logs. Query is:

Index=something app!="null" | dedup app | stats count by app

i am looking to use the single value and trendline to show the number of "apps" and whether there has been a decrease or increase.

Labels (1)
0 Karma
1 Solution

isoutamo
SplunkTrust
SplunkTrust

HI

you should try:

index=foo app=*
| timechart span=1d dc(app) as count_of_apps 

then select Single value as visualisation.

r. Ismo 

View solution in original post

0 Karma

isoutamo
SplunkTrust
SplunkTrust

HI

you should try:

index=foo app=*
| timechart span=1d dc(app) as count_of_apps 

then select Single value as visualisation.

r. Ismo 

0 Karma
Get Updates on the Splunk Community!

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...

State of Splunk Careers 2024: Maximizing Career Outcomes and the Continued Value of ...

For the past four years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...

Data-Driven Success: Splunk & Financial Services

Splunk streamlines the process of extracting insights from large volumes of data. In this fast-paced world, ...