Splunk Search

How to add an additional dummy row to a table?

tromero3
Path Finder

I have a search that outputs a table with two columns, one for log source one for total count (using stats count).

I'd like to add additional rows to the table where I can enter a custom field name for the "Log Source" column,  and then the total count column will be empty for that row. This will be for exporting the results of the table to CSV and the additional rows I will be adding will be empty so I can enter whatever value I want in the Total Count column and save it. 

So, this is how I would want it to look after the search is run (where Custom1 and Custom2 are the field names of the empty rows that I will be adding). 

Is this possible and how would I go about it? Thank you!

Log Source      Total Events
A                          20
B                          100
C                          50
Custom1
Custom2

Current query: 

 

index=A or index=B or index=C 
| eval "Log Source"=case(index == "A", "indexA", index == "B", "indexB", index == "C", "IndexC")
| stats count by "Log Source"
| append [| makeresults | eval indexA="", indexB="", indexC="" | table indexA indexB indexC | transpose column_name="Log Source" ]
| stats max(count) AS count BY "Log Source"
| fillnull value=0 count

 

Labels (2)
Tags (2)
0 Karma
1 Solution

tromero3
Path Finder

Thank you.  I played around with it but could not get appendpipe to work properly. I was able to add the additional rows by using my existing search and adding the values within the append search ("TEST" below ). 

index=A or index=B or index=C 
| eval "Log Source"=case(index == "A", "indexA", index == "B", "indexB", index == "C", "IndexC")
| stats count by "Log Source"
| append [| makeresults | eval indexA="", indexB="", indexC="", TEST="" | table indexA indexB indexC TEST | transpose column_name="Log Source" ]
| stats max(count) AS count BY "Log Source"
| fillnull value=0 count

 

View solution in original post

0 Karma

to4kawa
Ultra Champion

try appendpipe

tromero3
Path Finder

Thank you.  I played around with it but could not get appendpipe to work properly. I was able to add the additional rows by using my existing search and adding the values within the append search ("TEST" below ). 

index=A or index=B or index=C 
| eval "Log Source"=case(index == "A", "indexA", index == "B", "indexB", index == "C", "IndexC")
| stats count by "Log Source"
| append [| makeresults | eval indexA="", indexB="", indexC="", TEST="" | table indexA indexB indexC TEST | transpose column_name="Log Source" ]
| stats max(count) AS count BY "Log Source"
| fillnull value=0 count

 

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...