Splunk Search

In a search, Is there an alternative for the eventstats command?

patricianaguit
Explorer

I need to find another way instead of eventstats for my search.

Is there a way where I can tag the events and add another field based on hierarchy other than eventstats?

For example
Id 1 has different initial tags (A,B,C, and D) since A is the highest, the final tag should be "A"

ID   |                InitialTag               |  FinalTag
1                        A                            A
1                        B                            A
1                        C                            A
1                        D                            A

Tag Ranks:
A
B
C
D
0 Karma
1 Solution

harishalipaka
Motivator

hi @patricianaguit

Can you try this

you can use streamstats
or

 |stats values(InitalTag) by ID 
Thanks
Harish

View solution in original post

0 Karma

harishalipaka
Motivator

hi @patricianaguit

Can you try this

you can use streamstats
or

 |stats values(InitalTag) by ID 
Thanks
Harish
0 Karma

patricianaguit
Explorer

thank you!

0 Karma
Get Updates on the Splunk Community!

Why You Can't Miss .conf25: Unleashing the Power of Agentic AI with Splunk & Cisco

The Defining Technology Movement of Our Lifetime The advent of agentic AI is arguably the defining technology ...

Deep Dive into Federated Analytics: Unlocking the Full Power of Your Security Data

In today’s complex digital landscape, security teams face increasing pressure to protect sprawling data across ...

Your summer travels continue with new course releases

Summer in the Northern hemisphere is in full swing, and is often a time to travel and explore. If your summer ...