Splunk Search

Timechart & Stats Dc.

IRHM73
Motivator

Hi, I wondered whether someone may be able to help me please.

I'm using the query below which works but contains duplicate id numbers under field "detail.ur"

 index=main auditSource=preferences-frontend auditType=TxSucceeded tags.transactionName="Show Print Preference Option"
|eval Interstitpage=if('detail.journey'="Interstitial",1, 0 ) 
|eval AccountPage=if('detail.journey'="AccountDetails",1, 0 ) 
|timechart  span=1d sum(Interstitpage) AS ShownInterstitial, sum(AccountPage) AS ShownAccountPage 
|reverse

I'm trying to incorporate the "stats dc" command to remove these duplicates rather than the dedup because there are a lot of records involved and I know the dedup can be a little inefficient.

I've tried incorporating the "stats dc" in multiple areas of the query but I just can't get this to work.

I just wondered whether someone may be able to point me in the right direction so I may be able to get this to work.

Many thanks and kind regards

Chris

0 Karma
1 Solution

woodcock
Esteemed Legend

Your search does not contain any reference to field detail.ur so it cannot exist in your results and there is no way to examine it. If you know that your data has duplicate events then the proper thing to do is reduce them before you pas to timestats/chart/stats. The most straightforward (and perfectly correct/efficient) way to do this is by using dedup detail.ur as soon as possible before timechart.

View solution in original post

woodcock
Esteemed Legend

Your search does not contain any reference to field detail.ur so it cannot exist in your results and there is no way to examine it. If you know that your data has duplicate events then the proper thing to do is reduce them before you pas to timestats/chart/stats. The most straightforward (and perfectly correct/efficient) way to do this is by using dedup detail.ur as soon as possible before timechart.

fdi01
Motivator

try :

  index=main auditSource=preferences-frontend auditType=TxSucceeded tags.transactionName="Show Print Preference Option"
     |eval Interstitpage=if('detail.journey'="Interstitial",1, 0 ) 
     |eval AccountPage=if('detail.journey'="AccountDetails",1, 0 ) 
     |timechart  span=1d sum(Interstitpage) AS ShownInterstitial, sum(AccountPage) AS ShownAccountPage by "detail.ur"
     |reverse

or

...|rename "detail.ur" as ID |timechart  span=1d sum(Interstitpage) AS ShownInterstitial, sum(AccountPage) AS ShownAccountPage by ID| reverse
0 Karma

IRHM73
Motivator

Hi, thank you for coming back to me with this.

I have tried the first query you kindly provided, but unfortunately this doesn't work because it actually creates a column for each "detail.ur" value, rather than summing these under "ShownInterstitial" and "ShowAccountPage" and unfortunately your second query doesn't return any results.

Many thanks and kind regards

Chris

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Step into “Hunt the Insider: An Splunk ES Premier Mystery” to catch a cybercriminal ...

After a whole week of being on call, you fell asleep on your keyboard, and you hit a sequence of buttons that ...

SplunkTrust Application Period is Officially OPEN!

It's that time, folks! The application/nomination period for the 2026-2027 SplunkTrust is officially open. If ...

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...