Splunk Search

How to change stats on optional field?

rangarbus
Path Finder

Hello Folks,

I have the below query on one of my dashboard panel.

Here I pass the IN_BUSINESSDATE field value from dashboard (form input) with default as % and prefix & sufix value as %. So incase user does not provide, the query gets IN_BUSINESSDATE as %%% (its ok)

index=dockerlogs 
| search app_name = ABCD AND logEvent="Delivered"
| spath input=businessKey path=businessDate output=businessDate
| spath input=businessKey output=sourceSystem path=sourceSystem
| eval businessDate=substr(businessDate,1,10)
| where like(businessDate, "$IN_BUSINESSDATE$")
| stats count by businessDate, sourceSystem

Now I would like to change the stats on the query as below if IN_BUSINESSDATE is not provided (meaning value is %%%)

| stats count by sourceSystem

How can I achieve this ?

Thank you!

Labels (2)
Tags (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Add a change handler to the input and set another token business_date_entered to "businessDate" if there is an entry and "" otherwise, then use this new token on the stats command

| stats count by $business_date_entered$ sourceSystem

 

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Add a change handler to the input and set another token business_date_entered to "businessDate" if there is an entry and "" otherwise, then use this new token on the stats command

| stats count by $business_date_entered$ sourceSystem

 

Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...