Splunk Search

How to fill sparse data in a table for alert?

charming_fish
New Member
I have a query which results in a table:

"some words" | stats dc(host) as host_count by zone, region

My end goal is be able to create an alert if "host_count < 2" in any row. I will achieve that by adding " | where host_count < 2" to the query and alerting if the search is non-empty.

 
The issue is that in some cases, when there are no lines matching the  "some words" criteria, I will have no row for that zone/region combination in my table. (i.e. I will never have a row where host_count is 0). This will result in a false negative for the alert.

I had the thought that I could possibly merge the search result with a lookup table which provides the 0 value lines, but had no success.

How can I achieve this?
Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Try the timechart command.  It will automatically fill in zeroes for missing rows.

"some words" | timechart dc(host) as host_count by zone, region
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...