Splunk Search

How to change the result of my stats count?

juliop3p
Explorer

Hi guys,

I'm a Splunk beginner and I'm having some trouble making a specific query.

I have a health check log, I want to know how many times the user restarts my app. The first health check log is when the user logs in for the first time and the next is the times that the user restarts my app.

 

This is my current query:

 

index=myIndex Title=Healthcheck | stats count by Data.Ip

 

With the result of this query I have the total times the user opened my app, but I want to remove just 1 from the count of each user

current result:

Data.IP count
4.21.28.39 5
21.224.60.37 3


expected result:

Data.IP count
4.21.28.39 4
21.224.60.37 2
Labels (1)
Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Use the eval command to do that arithmetic.

index=myIndex Title=Healthcheck 
| stats count by Data.Ip
| eval count = count - 1
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Use the eval command to do that arithmetic.

index=myIndex Title=Healthcheck 
| stats count by Data.Ip
| eval count = count - 1
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Optimize Cloud Monitoring

  TECH TALKS Optimize Cloud Monitoring Tuesday, August 13, 2024  |  11:00AM–12:00PM PST   Register to ...

What's New in Splunk Cloud Platform 9.2.2403?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.2.2403! Analysts can ...

Stay Connected: Your Guide to July and August Tech Talks, Office Hours, and Webinars!

Dive into our sizzling summer lineup for July and August Community Office Hours and Tech Talks. Scroll down to ...