Splunk Search

How to display the results even if the result is 0 but just for hour corresponding to the current hour or to previous?

jip31
Motivator

hello

as you can see i stats events following the bin time value

But when the bin time value is equal to 0, I have nothing displayed

I would like to display the results even if the result is 0 but just for hour corresponding to the current hour or to the previous hour

It means that I dont want to display 0 for a bin time which is later than the current hour

 

 

index=toto sourcetype=titi
| bin span=1h _time 
| eval time = strftime(_time, "%H:%M")  
| stats count as Pb by s time 
| search Pb >= 3 
| stats dc(s) as nbs by time 
| rename time as Heure

 

 

I tried like this but it doesnt works

 

 

| appendpipe 
    [ stats count as _events 
    | where _events = 0 
    | eval nbs = 0 ]

 

 

 could you help please?

Labels (1)
Tags (1)
0 Karma
1 Solution

jip31
Motivator
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Please clarify what you mean by "no results" - do you mean that there are no events left in the pipeline (in which case the appendpipe technique should work) or that some time points have no results and you want a zero displayed for these timepoints?

0 Karma

jip31
Motivator

that some time points have no results and I want a zero displayed for these timepoints...

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Use timechart; for this you will need to move the eval time further down the search

index=toto sourcetype=titi
| bin span=1h _time
| stats count as Pb by s _time
| search Pb >= 3
| timechart dc(s) as nbs span=1h
| eval time = strftime(_time, "%H:%M")
| stats sum(nbs) as nbs by time
| rename time as Heure
0 Karma

jip31
Motivator

correct but what I dont like with this is that it displays _time which didn't occured

for example I displays 14h, 15, 16h with 0 result but I would like to display 0 results only for previous hour than current hour

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

This seems like a different ask from the original post. Please can you be more specific as the what you are trying to achieve, and what you have already tried?

0 Karma

jip31
Motivator

I have updated my post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
index=toto sourcetype=titi earliest=-1h@h
| bin span=1h _time
| stats count as Pb by s _time
| search Pb >= 3
| timechart dc(s) as nbs span=1h
| eval time = strftime(_time, "%H:%M")
| stats sum(nbs) as nbs by time
| rename time as Heure
0 Karma

jip31
Motivator

it's exactly the same problem

With this, I just have 1h events and not previous events

jip31_0-1646919454073.png

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

If you set earliest to -1h@h how are you getting results for more than an hour ago?

Can you show the search you are using for these results?

0 Karma

jip31
Motivator

I just have this

 

jip31_0-1646919727505.png

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Which is what you amended your question to ask for, i.e. current and previous hour even if the counts are 0?

0 Karma

jip31
Motivator

no

my search calculate events on the slot time below

earliest=@d+7h latest=@d+19h 

so I want to display all the events following this slot time with the bin span 

| bin span=1h _time

so it works perfectly except when the results is 0

If it's 0, actually nothing is displayed

So I need to display results = 0 if the bin time is previous to the current time but not if the bin time exceed the current time

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Finally, some clarity 😀

index=toto sourcetype=titi earliest=@d+7h latest=@d+19h
| bin span=1h _time
| stats count as Pb by s _time
| search Pb >= 3
| timechart dc(s) as nbs span=1h
| where _time < now()
| eval time = strftime(_time, "%H:%M")
| stats sum(nbs) as nbs by time
| rename time as Heure
0 Karma

jip31
Motivator

thanks

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...