Splunk Search

Eventstats not returning expected results

smruti13
Observer

Hi Splunk Gurus! 

I have come across an absurd issue where my eventstats is not recognizing the field value. 

Sample Problem:

Field1source
(Blank)dummy_source.csv
Record1dummy2_cource.csv

 

query:

|eventstats dc(source) as check by Field1

expected o/p: 

Field1sourcecheck
(Blank)dummy_source.csv 
Record1dummy2_cource.csv1

 

current o/p:

Field1sourcecheck
(Blank)dummy_source.csv 
Record1dummy2_cource.csv 

 

Additional Info:  I have the following message in my Splunk- Failed to register with cluster master... (not sure if its got something to do with the problem )

Any help is appreciated !

Thanks 🙂

Labels (3)
0 Karma

thambisetty
SplunkTrust
SplunkTrust

This looks strange for me. I have just tried with same field Field1 and its working as expected. I was thinking there could be an issue with an integer post fixed to the field. 

you can try couple things:

filter to get Record1. search Field1="Record1"

enclose Field1 in double quotes : |eventstats dc(source) as check by "Field1"

just add | fields Field1 to see whether you are seeing this field.

can you run eventstats for other events and see if thats working.

————————————
If this helps, give a like below.
0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...