Splunk Search

Stats Command and timestamp

chuck_life09
Path Finder

Hi ,

I am using a stats command with a "by" time field, but i am not getting the result.

If i remove the time field i am getting the desired result. 

I want all the fields in my outcome, how to obtain.

stats latest(et) as "ET" by status, id, starttime - If i remove this "starttime" i am getting the outcome but i need that also in my outcome. Can i put a separate table? but there also this column is not showing.

I want all these fields ET,Status,id,Startime

What to do?

Labels (1)
Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Make sure the starttime field exists and has values in it.  The stats command will not produce results if one of the "by" fields is null.

It would help if you shared some sample data and a mock-up of the desired results.

---
If this reply helps you, Karma would be appreciated.
0 Karma

chuck_life09
Path Finder

Hi @richgalloway 

Sample data

Et                                           status       I'd              starttime

2021/07/01 04:00:00     failed        abcf

2021/07/01 03:24:00

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Is that data sample complete?  If so, then the null fields explains why the stat command fails.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

What’s New in Splunk Observability Cloud – June 2025

What’s New in Splunk Observability Cloud – June 2025 We are excited to announce the latest enhancements to ...

Almost Too Eventful Assurance: Part 2

Work While You SleepBefore you can rely on any autonomous remediation measures, you need to close the loop ...

Leveraging Detections from the Splunk Threat Research Team & Cisco Talos

 Stay ahead of today’s evolving threats with the combined power of the Splunk Threat Research Team (STRT) and ...