Splunk Search

Splunk stats count for several search

vintik
Engager

Hello,

I have ~15 the same queries with a little difference:

(index=SOME_INDEX sourcetype=SOME_SOURCE source=... 
| eval API=CASE(searchmatch("xxx"), "yyy", ...) 
| search API=WebResponse
| eval Status=case(...) 
| stats avg(dur) AS Avg by status_code
| stats count by status_code

...

(index=SOME_INDEX sourcetype=SOME_SOURCE source=... 
| eval API=CASE(searchmatch("xxx"), "yyy", ...) 
| search API=AppResponse
| eval Status=case(...) 
| stats avg(dur) AS Avg by status_code
| stats count by status_code

So, all my queries are different only in one place - | search API=XXX and return result like:

| status_code | count |
|  201        |  10   |
|  404        |  28   |
etc

How I can combine all above queries into one and get result as (or something like this):

    | status_code | count(AppResponse) | count(WebResponse) | count(Other) |
    |  201        |  10                |  0                  |  0   |
    |  404        |  28                |  3                  |   0  |

?

0 Karma

somesoni2
SplunkTrust
SplunkTrust

Try this (there were two stats at the end of your search in question which seems wrong to me, because count will always be 1 in second stats.

(index=SOME_INDEX sourcetype=SOME_SOURCE source=... 
 | eval API=CASE(searchmatch("xxx"), "yyy", ...) 
 | search API=WebResponse
 | eval Status=case(...) 
 | chart count AS Avg by status_code API
0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...