Splunk Search

How to pass 0 to variable if no search result is found?

ahmadsaadwarrai
Explorer

I have scenario where I want variable (Loss) to be 0 if no result found of below search:

| dbxquery query="SELECT * FROM \"Cherwell\".\"dbo\".\"v_ServicelineToLogicalDevice_Splunk\"" connection="Cherwell-DB" 
| rename LNCID as RecID 
| join type=inner RecID 
    [| dbxquery query="SELECT * FROM \"Cherwell\".\"dbo\".\"v_LogicalCircuits_Splunk\"" connection="Cherwell-DB"] 
| rename RecID as LNCID 
| fields - Bandwidth Status 
| rename LogicalObjectSiteAID as Rec_ID 
| join type=inner Rec_ID 
    [ inputlookup objects] 
| rename Device_Name as Hostname 
| join type=inner Hostname 
    [ search index=index_zabbixnotify 
    | dedup IP Alarm 
    | search Status="PROBLEM"] 
| rename ServiceLineID as RecID 
| join type=left RecID 
    [| dbxquery query="SELECT * FROM \"Cherwell\".\"dbo\".\"v_ServiceLines_Splunk\"" connection="Cherwell-DB"] 
| search Status=Active 
| stats sum(Bandwidth) as Loss

I want Loss to be filled with 0 if nothing found. Search is working fine if it find some events.

0 Karma
1 Solution

denzelchung
Path Finder

You can add the following line at the end of your search:

| appendpipe [stats count | where count=0 | eval Loss=0 | fields - count]

View solution in original post

0 Karma

denzelchung
Path Finder

You can add the following line at the end of your search:

| appendpipe [stats count | where count=0 | eval Loss=0 | fields - count]
0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In November, the Splunk Threat Research Team had one release of new security content via the Enterprise ...

Index This | Divide 100 by half. What do you get?

November 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

❄️ Celebrate the season with our December lineup of Community Office Hours, Tech Talks, and Webinars! ...