Splunk Search

How to make empty fields display as Null

mihall
Path Finder

I am trying to display results that simply report if a certain field contains information or not.

My search is as follows:
Account_Name=da_* "Certificate Issuer Name" | stats count by user Certificate_Issuer_Name | eval Certificate_Issuer_Name=if(Certificate_Issuer_Name=null, "False", "True")

I think I am searching for this correctly, but it only outputs the values that are true. I think the issue might be that the null values are not registered as "Null" in Splunk. It does not show up when I look for how many values that field has, but I see events that have blank space where that info should be.

Is there any way to get these empty results to display in the report? Or is this an issue with how the data is registering in Splunk?

0 Karma
1 Solution

cmerriman
Super Champion

try this:

Account_Name=da_* "Certificate Issuer Name"| eval Certificate_Issuer_Name=if(isnull(Certificate_Issuer_Name), "False", "True") | stats count by user Certificate_Issuer_Name

View solution in original post

cmerriman
Super Champion

try this:

Account_Name=da_* "Certificate Issuer Name"| eval Certificate_Issuer_Name=if(isnull(Certificate_Issuer_Name), "False", "True") | stats count by user Certificate_Issuer_Name
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...