Splunk Search

Stats Count Field To Include 0 For each Bin period

sssplunker
Engager

I’m trying to get a count for activity on around 10 different APIs.

The search is:

index=api_logs | bin span=5min _time | stats count by _time, APIName

Is it possible to use stats count so the output includes an entry for each API in each 10 minute period and report a ‘0’ if there hasn’t been a call. I know you could chart it but I’d like the data in this particular format.

 

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Try this

| timechart span=5m count by APIName
| untable _time APIName count

View solution in original post

0 Karma

sssplunker
Engager

Thanks - I know it could be charted like that but that changes the structure of the data. I’d like to output the results in the three columns that stats count produces, so _time, APIname & count.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try this

| timechart span=5m count by APIName
| untable _time APIName count
0 Karma

sssplunker
Engager

Thanks!

Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

The timechart command will fill in the missing time periods.

| timechart span=5m count by APIName
0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...