Splunk Search

Why am I receiving fewer events when using rename command in Splunk?

vjsplunk
Loves-to-Learn Everything

I am getting fewer events when using rename command in splunk. ( Compared to the search where I haven't used rename). What could be the reason behind this?

0 Karma

vjsplunk
Loves-to-Learn Everything

Without rename:

index="A"  sourcetype="B"
| stats values(project_name2), count(linecount) by pod
| sort - count(linecount) | head 10

With rename:

index="A"  sourcetype="B"

| stats values(project_name2) as project count(linecount) as lines by pod
| sort - count(linecount) | head 10

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @vjsplunk,

the reason is that in the second case you don't have more ths field "count(linecount)" but the field "lines", so when you sort you have few events, please try this:

index="A"  sourcetype="B"
| stats values(project_name2) AS project count(linecount) AS lines BY pod
| sort -lines 
| head 10

Ciao.

Giuseppe

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @vjsplunk,

could you share your searches (with and without rename)?

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...