Splunk Search

How to add values to the fields?

ramesh12345
Explorer

Hi,

 index="osh" sourcetype="Service" CaseNumber=1111 status=* assignment_group=*
| dedup _time,CaseNumber,assignment_group 
| streamstats current=f last(assignment_group) as lg, last(active) as Active by CaseNumber 
| lookup Team.csv SO as sys_updated_by OUTPUT TeamName 
| eval is_escalated= if(assignment_group!=lg AND assignment_group="OSM L1",1,NULL) 
| eval is_resolved=if(assignment_group="OSM L1" AND status="Complete" AND (isnull(Active) OR Active="true"),1,NULL) 
| stats count(is_escalated) AS "Escalated Cases" count(is_resolved) AS "Resolved Cases" by sys_updated_by,TeamName 
| fields - TeamName

alt text

when i run this query it is displaying like that(attached image).

For that case number(1111) 2 members worked.so this case resolved case so the output should be 1 for two members.

if it is escalated cases then in escalated cases i should should assign 1.

How to do this?

Tags (1)
0 Karma

rsathish47
Contributor

Hi ,
you can use streamstats command for this

index=_internal | stats count by sourcetype | head 2| streamstats current=f last(count) as newcount

Thanks
Sathish R

0 Karma

ramesh12345
Explorer

Could you please send me the final query.i am little bit confused.

0 Karma

nickhills
Ultra Champion

You should post your searches using the code tool (icon which looks like 101010 ) I think some of the characters of your search have been stripped. - I edited this for you.

If my comment helps, please give it a thumbs up!
0 Karma