Splunk Search

How to get distinct count for which if condition satisfies?

arugupta
New Member

My Aim :
This below query gives me count of success, failure by b_key, c_key. I want to get the distinct count of b_key for which the failure occurred. In the example below it will be 2.

arugupta_0-1675258560121.png

 

 

 

| eval Complete = case(key_a="complete", "Complete")
| eval Init = case(key_a="init" , "Init")
| stats count(Init) as Init, count(Complete) as Complete by b_key, c_key
| eval Fcount = if((Init != Complete),1,0) 
| eval Scount = if((Init = Complete),1,0) 
| stats sum(Fcount) as FailureCount, sum(Scount) as SuccessCount 
| eval total=(FailureCount+SuccessCount) 
| eval Success% = round(SuccessCount/total*100,2)
| eval Failure% = round(FailureCount/total*100,2) 
| table FailureCount, SuccessCount, Success%, Failure%

 

 

Labels (1)
0 Karma

arugupta
New Member

@ITWhisperer It did not solve the purpose. Can you explain in brief what is it doing? What is 'eval key='Non-zero count' referring to?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

This just sets a "label" for the row with the totals in

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| appendpipe
    [| stats count(eval(SuccessCount>0)) as SuccessCount count(eval(FailureCount>0)) as FailureCount
    | eval key="Non-zero counts"]
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...