Splunk Search

Help with an eval statement?

svemurilv
Path Finder

I am trying to build a base search for the field message.device.category , it has 3 values: desktop , mobile and tablet.

Using eval I am trying to divide the field with separate values.

search | eval MobileUsers=if("message.device.category" == "Mobile", "Mobile",NULL) |eval DesktopUsers=if("message.device.category" == "Desktop", "Desktop",NULL) |eval tabUsers=if("message.device.category" == "Tablet", "Tablet",NULL) |event stats count(DesktopUsers) ,count (MobileUsers) ,count(tabUsers)

its not returning any values in the counts.

0 Karma
1 Solution

sbbadri
Motivator

@svemurilv

try this,

your search here | eval result_users = case("message.device.category" == "Mobile", "Mobile","message.device.category" == "Desktop", "Desktop","message.device.category" == "Tablet", "Tablet") | stats count by result_users

View solution in original post

0 Karma

sbbadri
Motivator

@svemurilv

try this,

your search here | eval result_users = case("message.device.category" == "Mobile", "Mobile","message.device.category" == "Desktop", "Desktop","message.device.category" == "Tablet", "Tablet") | stats count by result_users

0 Karma

mwdbhyat
Builder

I can see that you have written eventstats as "event stats" and a space between the count and the (Mobile...).. im guessing thats formatting on this page?

Is the search returning anything without the eventstats section?

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...