Splunk Search

Show count by a field value

Karthikeyan
Engager

Hi Experts,

I have a requirement to in which a table is ingested to Splunk. And the table has a field named Time showing timestamp as "YYYY-MM-DD HH:MM:SS:milisec". Data ingestion is happening without any issues. When I tried to show the count of events in a particular day

1. With stats command, the count is is matching with source, but there are times when there is no event happens in source system and that day count is not showing as 0 in Splunk, its just ignored.

2. With time command, Splunk takes the ingested timestamp of the event and not the timestamp in the event, and the count is not matching. Whereas, here when there is no data gets ingested, the count is showing as 0.

Please help me with this issue, where the count should be calculated with the field Time and in case if there is no event for a day, that should get displayed as 0. I'm trying to show the data in a bar chart.

 

Any help is much appreciated. Thanks.

Regards, Karthikeyan.SV

Labels (3)
0 Karma

Karthikeyan
Engager

Since this is ingested as a table, no new source are generated and hence we could see not count values. Apart from time field, there are other unique fields such as EXECUTION_HASH, EXECUTION_ID, with which I tried to do a count, but couldn't get desired result.

Search query:
| eval _time=TIME
| timechart count by EXECUTION_ID

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The stats command counts events.  If data from a certain source is absent then it is not counted.

The timechart command also counts events, but will automatically (unless told otherwise) fill in zeroes for time periods with no data.  Again, if a source is completely absent then it cannot be counted.

The timechart command requires the _time field for it to work.  You can, however, set _time to any other field you have.

... | eval _time=Time
| timechart count by source

 

---
If this reply helps you, Karma would be appreciated.
0 Karma

Karthikeyan
Engager

Hi,

We use below search query to find the count

index="index" sourcetype="source_events"
| eval time=strptime(TIME,"%Y-%m-%d %H:%M:%S.%Q")
| eval date = strftime(time,"%Y-%m-%d")
|timechart span=1d count(date)

 

When I tried with the provided search command, didn't get the output.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...