Splunk Enterprise

Count of rows with a value greater than 0

3666142
Path Finder

How do a get a count of rows that have a value greater than 0? Example below. The last column is what we are trying to generate.

Name    2024-02-06  2024-02-08    2024-02-13  2024-02-15     Count_Of_Rows_with_Data
Pablo       1          0              1          0               2
Eli         0          0              0          0               0
Jenna       1          0              0          0               1
Chad        1          0              5          0               2

 

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| eval Count_Of_Rows_With_Data=0
| foreach 20*
    [| eval Count_Of_Rows_With_Data=if('<<FIELD>>' > 0, Count_Of_Rows_With_Data+1, Count_Of_Rows_With_Data)]

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Alternatively, without having to know the names of the fields

| untable Name Date value
| appendpipe
    [| stats count(eval(value > 0)) as value by Name
    | eval Date="Count_Of_Rows_With_Data"]
| xyseries Name Date value
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval Count_Of_Rows_With_Data=0
| foreach 20*
    [| eval Count_Of_Rows_With_Data=if('<<FIELD>>' > 0, Count_Of_Rows_With_Data+1, Count_Of_Rows_With_Data)]

3666142
Path Finder

Perfect. Thank you!

0 Karma
Get Updates on the Splunk Community!

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...