Splunk Search

Set values to 0 when there are no search results

mborn
New Member

Hi,

on Splunk Enterprise 6.6.5 I have the following problem:
I am using 3 saved searches in one dashboard via appendcols and have additional columns where I use the output from the saved searches to compute new values. However, for one search the column frequently stays blank asthere are no results in the chosen time frame instead of showing zeroes and so do the columns corresponding to searches using the empty column.
I would like to fill the empty column with zeroes and have the other columns use 0 as a value for their computations. filnull does not seem to help here.

Any help is much appreciated!

Thanks!

0 Karma

horsefez
Motivator

Hi mborn,

you can also go for something like this.

<yoursearch> | eval <nameoffield>=if(isnull(<nameoffield>), "0", <nameoffield>)

mborn
New Member

Hi pyro_wood,

thanks for the help! While that suggestion did not quite do the trick (the result was the same in the end) I could figure out a way going from there. The search which lead to the column being filled with zeroes was:

| savedsearch | appendcols [ | savedsearch | appendpipe [ stats count | where count==0 | eval =0 | table ] ] | fillnull.

0 Karma

pradeepkumarg
Influencer

Can you explain more on why fillnull doesn't work for you? Make sure you do the fillnull prior to your computations and not at the end.

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...