Splunk Search

Help writing a search to count by event type?

archananaveen
Explorer

eventtype=* |stats count by eventtype which works.

However, in a dashboard below query doesn't work. Any suggestions please?

index=$111111$ $22222$ eventtype=* |stats count by eventtype

0 Karma

nickhills
Ultra Champion

I think you want:

(index=$111111$ OR index=$22222$) eventtype=* |stats count by eventtype
If my comment helps, please give it a thumbs up!

DalJeanis
Legend

@nickhillscpl - you may be right. That $22222$ may be the issue, if it is intended to be an index. I'd also be worried about token names that are purely numeric. I didn't find a reference for token naming conventions, but all the examples start with an alpha, and all numeric token names seem potentially problematic.

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...