Splunk Search

How to use stats group by _time without null fields?

josefa123
Explorer

Here is a screenshot of what I do. alt text

How can I remove null fields and put the values side by side? I am using stats table group by _time to get all the metrics but it seems that metrics are not indexed at the same time and result in blank fields. How can I resolve this issue? Thanks

0 Karma
1 Solution

woodcock
Esteemed Legend

The easiest way is to "fudge" the time a bit like this:

Your Original Search up until the stats command here | bucket _time span=5m | stats first (*) AS * BY _time

If you still see some NULL values, keep bumping up 5m until you don't.

View solution in original post

0 Karma

woodcock
Esteemed Legend

The easiest way is to "fudge" the time a bit like this:

Your Original Search up until the stats command here | bucket _time span=5m | stats first (*) AS * BY _time

If you still see some NULL values, keep bumping up 5m until you don't.

0 Karma

pradeepkumarg
Influencer

how does _time look in the above table? you can bucket the events into a specific time range before you do stats . This way all events within that time period are grouped together. Example below which groups all the events in a 5 min window

.. | bucket _time span=5m | stats..

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...