Splunk Search

Splunk stats count for several search

vintik
Engager

Hello,

I have ~15 the same queries with a little difference:

(index=SOME_INDEX sourcetype=SOME_SOURCE source=... 
| eval API=CASE(searchmatch("xxx"), "yyy", ...) 
| search API=WebResponse
| eval Status=case(...) 
| stats avg(dur) AS Avg by status_code
| stats count by status_code

...

(index=SOME_INDEX sourcetype=SOME_SOURCE source=... 
| eval API=CASE(searchmatch("xxx"), "yyy", ...) 
| search API=AppResponse
| eval Status=case(...) 
| stats avg(dur) AS Avg by status_code
| stats count by status_code

So, all my queries are different only in one place - | search API=XXX and return result like:

| status_code | count |
|  201        |  10   |
|  404        |  28   |
etc

How I can combine all above queries into one and get result as (or something like this):

    | status_code | count(AppResponse) | count(WebResponse) | count(Other) |
    |  201        |  10                |  0                  |  0   |
    |  404        |  28                |  3                  |   0  |

?

0 Karma

somesoni2
Revered Legend

Try this (there were two stats at the end of your search in question which seems wrong to me, because count will always be 1 in second stats.

(index=SOME_INDEX sourcetype=SOME_SOURCE source=... 
 | eval API=CASE(searchmatch("xxx"), "yyy", ...) 
 | search API=WebResponse
 | eval Status=case(...) 
 | chart count AS Avg by status_code API
0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...