Splunk Search

Eventstats not returning expected results

smruti13
Observer

Hi Splunk Gurus! 

I have come across an absurd issue where my eventstats is not recognizing the field value. 

Sample Problem:

Field1source
(Blank)dummy_source.csv
Record1dummy2_cource.csv

 

query:

|eventstats dc(source) as check by Field1

expected o/p: 

Field1sourcecheck
(Blank)dummy_source.csv 
Record1dummy2_cource.csv1

 

current o/p:

Field1sourcecheck
(Blank)dummy_source.csv 
Record1dummy2_cource.csv 

 

Additional Info:  I have the following message in my Splunk- Failed to register with cluster master... (not sure if its got something to do with the problem )

Any help is appreciated !

Thanks 🙂

Labels (2)
0 Karma

thambisetty
SplunkTrust
SplunkTrust

This looks strange for me. I have just tried with same field Field1 and its working as expected. I was thinking there could be an issue with an integer post fixed to the field. 

you can try couple things:

filter to get Record1. search Field1="Record1"

enclose Field1 in double quotes : |eventstats dc(source) as check by "Field1"

just add | fields Field1 to see whether you are seeing this field.

can you run eventstats for other events and see if thats working.

————————————
If this helps, give a like below.
0 Karma
Get Updates on the Splunk Community!

Developer Spotlight with Brett Adams

In our third Spotlight feature, we're excited to shine a light on Brett—a Splunk consultant, innovative ...

Index This | What can you do to make 55,555 equal 500?

April 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Say goodbye to manually analyzing phishing and malware threats with Splunk Attack ...

In today’s evolving threat landscape, we understand you’re constantly bombarded with phishing and malware ...