Splunk Search

Confusion with count

palisetty
Communicator

I have a source with 100,000 events. For an Interesting field "action" where it has value as "purchase" with a count of 21,000. I want to make use of stats command with count function to see the count of events in my event list.
I tried this but it is not accepting.

index="main"
| stats count(action) =" purchase" as "Total count of Purchase occurences"

What is the correct syntax, please?

Tags (2)
0 Karma
1 Solution

kamlesh_vaghela
SplunkTrust
SplunkTrust

@palisetty

Try this.

index="main" | stats count(eval(action="purchase")) as "Total count of Purchase occurences"

View solution in original post

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@palisetty

Try this.

index="main" | stats count(eval(action="purchase")) as "Total count of Purchase occurences"
0 Karma

palisetty
Communicator

Thank You. It worked

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security: Your Command Center for PCI DSS Compliance

Every security professional knows the drill. The PCI DSS audit is approaching, and suddenly everyone's asking ...

Developer Spotlight with Guilhem Marchand

From Splunk Engineer to Founder: The Journey Behind TrackMe    After spending over 12 years working full time ...

Cisco Catalyst Center Meets Splunk ITSI: From 'Payments Are Down' to Root Cause in ...

The Problem: When Networks and Services Don't Talk Payment systems fail at a retail location. Customers are ...