Splunk Search

count condition

subachu
New Member

I'm having trouble writing a search statement that sets the count to 0 when the service is normally.

This is my data example.

name status
A failed
B failed
C failed
A normally
B normally
C normally

Counting with name will also count normally.
I want to count status failed only.

In this case, everything is normally, I want to display 0.

I know this is not correct, but I want to do like this.

|eval A =if((status=failed),count,null)
|stats count as A

I can't think of a conditional statement that counts when the status is failed.

Tags (1)
0 Karma
1 Solution

mayurr98
Super Champion

Try this ?

 <your search> | stats count(eval(status="failed")) as failed_count by name

View solution in original post

mayurr98
Super Champion

Try this ?

 <your search> | stats count(eval(status="failed")) as failed_count by name

Sukisen1981
Champion

instead of if , use a case
|eval A=case(status=failed,1)
so A has counts only for failed status

0 Karma

subachu
New Member

Thank you for helping.
what do it mean (status=failed,1)?
I thought (status=failed,0).

0 Karma

Sukisen1981
Champion

hi you said 'I want to count status failed only.' hence I made status=failed as 0.
You can assign any value based on your need

0 Karma
Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...