Splunk Search

Discrete count on a condition

priya777
New Member

Hi Splunk team,
I am trying to run a command below, I need my end output as dc(totalCustomers) and dc(Customers_520Error)

Query:

index=*** event=test |
stats dc(customerId) as totalCustomers|
eval errortype=case(errorCode="520","error_520") |
chart dc(customerId) over errorType

Tags (1)
0 Karma

to4kawa
Ultra Champion
index=yours event=test errorCode=520
| stats count by customerId
| eventstats dc(customerId) as totalCustomers

your code:

index=*** event=test 
|stats dc(customerId) as totalCustomers
|eval errortype=case(errorCode="520","error_520") 
|chart dc(customerId) over errorType
  1. As you want only errorCode="520",try searching first.
  2. eval errortype can't work. After stats, there is not errorCode field
  3. chart has display limit. use stats at this case.
  4. When you ask the question, please provide sample logs and query.
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Build the Future of Agentic AI: Join the Splunk Agentic Ops Hackathon

AI is changing how teams investigate incidents, detect threats, automate workflows, and build intelligent ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...