Splunk Search

Want to display count as zero in statistics when there is no events for a IP.

sathiyasun
Explorer

index=bc cs_host="collector" NOT 10.xx,xxx.121 c_ip=10.xx.xxx.233 OR c_ip=10.xx.xxx.234 OR c_ip=10.xx.xxx.248 OR c_ip=10.xx.xxx.250 OR c_ip=10.xx.xxx.42 OR c_ip=10.xx.xxx.43
|stats count by c_ip

It only display the count which has event, how could i force in search to display zero there is no data/event for an IP.
The screenshot display only the IP which has results but not showing which didnt have data/event.alt text

1 Solution

grittonc
Contributor

I don't see a way to do this without telling Splunk the IPs that you want to see in your output. Give this a try:

index=bc cs_host="collector" NOT 10.xx,xxx.121 c_ip=10.xx.xxx.233 OR c_ip=10.xx.xxx.234 OR c_ip=10.xx.xxx.248 OR c_ip=10.xx.xxx.250 OR c_ip=10.xx.xxx.42 OR c_ip=10.xx.xxx.43 
|stats count by c_ip
| append
[| makeresults 
    | eval c_ip="10.xx.xxx.233, 10.xx.xxx.234, 10.xx.xxx.248, 10.xx.xxx.250, 10.xx.xxx.42, 10.xx.xxx.43" , count=0
    | makemv c_ip delim=", " 
    | mvexpand c_ip 
    | table c_ip, count]
| stats sum(count) as count by c_ip

If this works for you, you could skip the makeresults step by creating a lookup table with the IP addresses that you want, but you might not want that if you frequently change the list that you want.

View solution in original post

0 Karma

grittonc
Contributor

I don't see a way to do this without telling Splunk the IPs that you want to see in your output. Give this a try:

index=bc cs_host="collector" NOT 10.xx,xxx.121 c_ip=10.xx.xxx.233 OR c_ip=10.xx.xxx.234 OR c_ip=10.xx.xxx.248 OR c_ip=10.xx.xxx.250 OR c_ip=10.xx.xxx.42 OR c_ip=10.xx.xxx.43 
|stats count by c_ip
| append
[| makeresults 
    | eval c_ip="10.xx.xxx.233, 10.xx.xxx.234, 10.xx.xxx.248, 10.xx.xxx.250, 10.xx.xxx.42, 10.xx.xxx.43" , count=0
    | makemv c_ip delim=", " 
    | mvexpand c_ip 
    | table c_ip, count]
| stats sum(count) as count by c_ip

If this works for you, you could skip the makeresults step by creating a lookup table with the IP addresses that you want, but you might not want that if you frequently change the list that you want.

0 Karma
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...