Splunk Search

How to write a search to create a summary index with a count of "0" when there are no events matching "myerror"?

burwell
SplunkTrust
SplunkTrust

I have a search to create a summary index which runs every 15 minutes:

 index=foo "myerror" | bin span=15m _time |  sistats count by _time

I'd like to have 0 in my summary search when there are no events matching "myerror".

How do I do that?

0 Karma

somesoni2
Revered Legend

Give this a try

  index=foo "myerror" | bin span=15m _time |  sistats count by _time | appendpipe [| stats count | where count=0 | addinfo  | eval _time=info_min_time| bucket span=15m _time | table _time count | sistats count by _time ]

burwell
SplunkTrust
SplunkTrust

I tried this (I am getting rid of the bin span)... this works except when there are no errors then it says 1 instead of 0.

I tried adding eval count=count-1 in the appendpipe clause but could not get this to give me zero.

index=foo "myerror" | sistats count |appendpipe [| stats count | where count=0 | addinfo  | eval _time=info_min_time|  table _time count |  sistats count    ]
0 Karma

jkat54
SplunkTrust
SplunkTrust

See if this works: Change it from sistats to stats and use the collect command..,

 ... | stats count by _time | collect index=summary 
0 Karma

burwell
SplunkTrust
SplunkTrust

Thanks but that didn't do it. I don't get data when I have no events.

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...