Splunk Search

help on stats count by command

jip31
Motivator

hello

I use the search below in order to do a total count by OS and by build
It mean that it counts only events which have a build AND an OS
I would like to do another count but this time I would like to do a total count of events which have a build OR an OS
Could you help me please??

eventtype="AppliEV" | fields Name, Level, host 
| dedup host 
| stats count by host 
| join host type="outer" 
    [ search index="x" sourcetype=x key_path="x" 
        OR 
        key_path="x" 
    | eval OS=if(key_path=="x"), 
        Build=if(key_path=="x" 
    | stats latest(OS) as OS latest(Build) as Build by host] 
| stats values(OS) as OS values(Build) as Build by host 
| stats count as Total by OS Build
Tags (1)
0 Karma
1 Solution

FrankVl
Ultra Champion

One way to approach that would be:

 eventtype="AppliEV" | fields Name, Level, host 
 | dedup host 
 | stats count by host 
 | join host type="outer" 
     [ search index="x" sourcetype=x key_path="x" 
         OR 
         key_path="x" 
     | eval OS=if(key_path=="x"), 
         Build=if(key_path=="x" 
     | stats latest(OS) as OS latest(Build) as Build by host] 
 | stats values(OS) as OS values(Build) as Build by host 
 | fillnull value="unknown" OS,Build
 | stats count as Total by OS Build

By using fillnull, every event will have an OS and a Build value (value is set to "unknown" when it did not have a value).

View solution in original post

0 Karma

FrankVl
Ultra Champion

One way to approach that would be:

 eventtype="AppliEV" | fields Name, Level, host 
 | dedup host 
 | stats count by host 
 | join host type="outer" 
     [ search index="x" sourcetype=x key_path="x" 
         OR 
         key_path="x" 
     | eval OS=if(key_path=="x"), 
         Build=if(key_path=="x" 
     | stats latest(OS) as OS latest(Build) as Build by host] 
 | stats values(OS) as OS values(Build) as Build by host 
 | fillnull value="unknown" OS,Build
 | stats count as Total by OS Build

By using fillnull, every event will have an OS and a Build value (value is set to "unknown" when it did not have a value).

0 Karma

jip31
Motivator

Many thanks franck

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Answers Content Calendar

Two parameters are needed for shortenTextAtSpace function: string and maxLen. Ellipsis is optional.

Detecting Brute Force Account Takeover Fraud with Splunk

This article is the second in a three-part series exploring advanced fraud detection techniques using Splunk. ...

Buttercup Games: Further Dashboarding Techniques (Part 9)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...