Splunk Search

In a search, Is there an alternative for the eventstats command?

patricianaguit
Explorer

I need to find another way instead of eventstats for my search.

Is there a way where I can tag the events and add another field based on hierarchy other than eventstats?

For example
Id 1 has different initial tags (A,B,C, and D) since A is the highest, the final tag should be "A"

ID   |                InitialTag               |  FinalTag
1                        A                            A
1                        B                            A
1                        C                            A
1                        D                            A

Tag Ranks:
A
B
C
D
0 Karma
1 Solution

harishalipaka
Motivator

hi @patricianaguit

Can you try this

you can use streamstats
or

 |stats values(InitalTag) by ID 
Thanks
Harish

View solution in original post

0 Karma

harishalipaka
Motivator

hi @patricianaguit

Can you try this

you can use streamstats
or

 |stats values(InitalTag) by ID 
Thanks
Harish
0 Karma

patricianaguit
Explorer

thank you!

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...