Splunk Search

How to change stats on optional field?

rangarbus
Path Finder

Hello Folks,

I have the below query on one of my dashboard panel.

Here I pass the IN_BUSINESSDATE field value from dashboard (form input) with default as % and prefix & sufix value as %. So incase user does not provide, the query gets IN_BUSINESSDATE as %%% (its ok)

index=dockerlogs 
| search app_name = ABCD AND logEvent="Delivered"
| spath input=businessKey path=businessDate output=businessDate
| spath input=businessKey output=sourceSystem path=sourceSystem
| eval businessDate=substr(businessDate,1,10)
| where like(businessDate, "$IN_BUSINESSDATE$")
| stats count by businessDate, sourceSystem

Now I would like to change the stats on the query as below if IN_BUSINESSDATE is not provided (meaning value is %%%)

| stats count by sourceSystem

How can I achieve this ?

Thank you!

Labels (2)
Tags (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Add a change handler to the input and set another token business_date_entered to "businessDate" if there is an entry and "" otherwise, then use this new token on the stats command

| stats count by $business_date_entered$ sourceSystem

 

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Add a change handler to the input and set another token business_date_entered to "businessDate" if there is an entry and "" otherwise, then use this new token on the stats command

| stats count by $business_date_entered$ sourceSystem

 

Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...