Splunk Search

How to eliminate zero values

ravichandran
Explorer

I am executing the following search query:
eventtype="some_error"| timechart span=1h count(eventtype)

The result shows by hour span. I want to show only the hour where the error count is greater than 0

Tags (1)
1 Solution

somesoni2
Revered Legend

Try this

eventtype="some_error" | bucket span=1h _time | stats count(eventtype) by _time

View solution in original post

somesoni2
Revered Legend

Try this

eventtype="some_error" | bucket span=1h _time | stats count(eventtype) by _time
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...