Splunk Search

How to group events based on a fields with predefined values?

ChrisPatin
New Member

I need to group by a field where all possible values should be shown in the result.

For example, the below snippet groups by interface, but rows can be omitted if the query does not return results for an interface.

<search> | stats count(state='success') as count by interface 

For example, three interfaces exist. [A, B, C]. The search has no results for C.

Output
interface      count
A              100
B              200

Missing Record
C              0

How can any missing records be included?  Any option where a lookup table is not used?

Labels (1)
0 Karma

bowesmana
SplunkTrust
SplunkTrust

Something along these lines

| makeresults
| eval _raw="interface      count
A              100
B              200"
| multikv forceheader=1
| stats sum(count) as count by interface
``` Up to here simulates your example ```
``` Use this to append/resolve all expected interfaces ```
| append [ 
  | makeresults
  | fields - _time
  | eval interface = split("A,B,C", ",")
  | mvexpand interface
  | eval count=0
]
| stats max(count) as count by interface

Just append the required interfaces to the and and then resolve them with stats. It's effectively the same as how you do it with a lookup, but here you are just manufacturing the required values.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

Step into “Hunt the Insider: An Splunk ES Premier Mystery” to catch a cybercriminal ...

After a whole week of being on call, you fell asleep on your keyboard, and you hit a sequence of buttons that ...