Splunk Cloud Platform

Single value for specific field

usmsplunksme
Explorer

HI fellow splunkers,

I am trying to count a distinct number of applications from our logs. Query is:

Index=something app!="null" | dedup app | stats count by app

i am looking to use the single value and trendline to show the number of "apps" and whether there has been a decrease or increase.

Labels (1)
0 Karma
1 Solution

isoutamo
SplunkTrust
SplunkTrust

HI

you should try:

index=foo app=*
| timechart span=1d dc(app) as count_of_apps 

then select Single value as visualisation.

r. Ismo 

View solution in original post

0 Karma

isoutamo
SplunkTrust
SplunkTrust

HI

you should try:

index=foo app=*
| timechart span=1d dc(app) as count_of_apps 

then select Single value as visualisation.

r. Ismo 

0 Karma
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk + Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...