Splunk Search

How can I do a sum of count for if statement?

tamduong16
Contributor

When I do a stats count by a specific column. The count for each of them work. Here is the picture:

alt text

But when I actually try to count only the Failed Attempt call. The result is 0. Did I do something wrong here?

alt text

0 Karma
1 Solution

somesoni2
Revered Legend

In the eval command expressions (and where command too), if a field name contains spaces, you need to enclose them in single quotes not double quotes. With double quotes, they are treated as literal string instead of fields. You did it correctly in line 2 (replace command) but missed in line three. Correcting that would resolve your issue.

Like this

index="monthlycdr"
| eval "Disconnect Info"=replace('Disconnect Info' ,"\"","")
| eval "Failure Rate" = if(match('Disconnect Info',"(?i)Failed Attempt"),1,0)
| stats sum("Failure Rate")

View solution in original post

cmerriman
Super Champion

can you avoid the spaces? SPL works better, generally, without them.

index=monthlycdr
|eval DisconnectInfo=replace('Disconnect Info',"\"","")
|eval "FailureRate"=if(match(DisconnectInfo,"(?i)Failed Attempt"),1,0)
|stats sum(FailureRate) as "Failure Rate"

somesoni2
Revered Legend

In the eval command expressions (and where command too), if a field name contains spaces, you need to enclose them in single quotes not double quotes. With double quotes, they are treated as literal string instead of fields. You did it correctly in line 2 (replace command) but missed in line three. Correcting that would resolve your issue.

Like this

index="monthlycdr"
| eval "Disconnect Info"=replace('Disconnect Info' ,"\"","")
| eval "Failure Rate" = if(match('Disconnect Info',"(?i)Failed Attempt"),1,0)
| stats sum("Failure Rate")

niketn
Legend

I think following is the only query required. | eval "Disconnect Info"=replace('Disconnect Info' ,"\"","") before stats is required only if double quotes may be present between "Failed Attempt" pattern being matched.

 index="monthlycdr"
|  stats count(eval(match('Disconnect Info',"(?i)^Failed Attempt"))) as "Failed Attempt"
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

tamduong16
Contributor

thanks guys

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...