Splunk Search

Show results of stats count when result is 0

tromero3
Path Finder

I have a search using stats count but it is not showing the result for an index that has 0 results. There is two columns, one for Log Source and the one for the count.   I'd like to  show the count of EACH index, even if there is 0 result. 

example

log source  count
A                    20
B                    10
C                     0

 

index=A or index=B or index=C 
| eval "Log Source"=case(index == "A", "indexA", index == "B", "indexB", index == "C", "IndexC")
| stats count by "Log Source"

 

 

 

Labels (3)
0 Karma
1 Solution

yeahnah
Motivator

Hi @tromero3 

You can hard code the log source list to the end of your results.  Using your initial example query something like this should work.

index=A or index=B or index=C 
| eval "Log Source"=case(index == "A", "indexA", index == "B", "indexB", index == "C", "IndexC")
| stats count by "Log Source"
 `comment("# ensure all log sources listed")`
| append [| makeresults | eval indexA="", indexB="", indexC="" | table indexA indexB indexC | transpose column_name="Log Source" ]
| stats max(count) AS count BY "Log Source"
| fillnull value=0 count

 Hope this helps.

View solution in original post

jorjiana88
Path Finder

fillnull

0 Karma

tromero3
Path Finder

already tried that, it doesn't work

0 Karma

to4kawa
Ultra Champion
| tstats count where index=A OR index=B OR index=C
| append [|makeresults 
| eval index=split("ABC",""), count=0 | mvexpand index| table index count]
| dedup index
| eval "Log Source"=case(index == "A", "indexA", index == "B", "indexB", index == "C", "IndexC")
| table "Log Source" count

your sample is "index=A" , so it's difficult to use split() for actually log, I guess. you can do it.

0 Karma

tromero3
Path Finder

Im confused about the split part, is that just combining the name of each index into one? (where you put 

("ABC","")

 And why is that part needed?

My index names are actually longer of course and with dashes in the name such as "first-index", "second-index', etc 

Also the first part of my search is longer not just the individual index. But more like

(index=first-index event_type=security) OR (index=second-index rule_reason=IPblock)

and so on...

0 Karma

to4kawa
Ultra Champion

You asked what to do if you don't have index ABC, so I answered, but the conditions are totally different.

I can't answer this. Good luck.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Have you considered appending a dummy event for each log and then subtracting 1 from every count?

0 Karma

yeahnah
Motivator

Hi @tromero3 

You can hard code the log source list to the end of your results.  Using your initial example query something like this should work.

index=A or index=B or index=C 
| eval "Log Source"=case(index == "A", "indexA", index == "B", "indexB", index == "C", "IndexC")
| stats count by "Log Source"
 `comment("# ensure all log sources listed")`
| append [| makeresults | eval indexA="", indexB="", indexC="" | table indexA indexB indexC | transpose column_name="Log Source" ]
| stats max(count) AS count BY "Log Source"
| fillnull value=0 count

 Hope this helps.

tromero3
Path Finder

wow that worked perfectly, thank you! 😀

0 Karma
Get Updates on the Splunk Community!

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

March Community Office Hours Security Series Uncovered!

Hello Splunk Community! In March, Splunk Community Office Hours spotlighted our fabulous Splunk Threat ...

Stay Connected: Your Guide to April Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars in April. This post ...