Splunk Search

help on stats count by command

jip31
Motivator

hello

I use the search below in order to do a total count by OS and by build
It mean that it counts only events which have a build AND an OS
I would like to do another count but this time I would like to do a total count of events which have a build OR an OS
Could you help me please??

eventtype="AppliEV" | fields Name, Level, host 
| dedup host 
| stats count by host 
| join host type="outer" 
    [ search index="x" sourcetype=x key_path="x" 
        OR 
        key_path="x" 
    | eval OS=if(key_path=="x"), 
        Build=if(key_path=="x" 
    | stats latest(OS) as OS latest(Build) as Build by host] 
| stats values(OS) as OS values(Build) as Build by host 
| stats count as Total by OS Build
Tags (1)
0 Karma
1 Solution

FrankVl
Ultra Champion

One way to approach that would be:

 eventtype="AppliEV" | fields Name, Level, host 
 | dedup host 
 | stats count by host 
 | join host type="outer" 
     [ search index="x" sourcetype=x key_path="x" 
         OR 
         key_path="x" 
     | eval OS=if(key_path=="x"), 
         Build=if(key_path=="x" 
     | stats latest(OS) as OS latest(Build) as Build by host] 
 | stats values(OS) as OS values(Build) as Build by host 
 | fillnull value="unknown" OS,Build
 | stats count as Total by OS Build

By using fillnull, every event will have an OS and a Build value (value is set to "unknown" when it did not have a value).

View solution in original post

0 Karma

FrankVl
Ultra Champion

One way to approach that would be:

 eventtype="AppliEV" | fields Name, Level, host 
 | dedup host 
 | stats count by host 
 | join host type="outer" 
     [ search index="x" sourcetype=x key_path="x" 
         OR 
         key_path="x" 
     | eval OS=if(key_path=="x"), 
         Build=if(key_path=="x" 
     | stats latest(OS) as OS latest(Build) as Build by host] 
 | stats values(OS) as OS values(Build) as Build by host 
 | fillnull value="unknown" OS,Build
 | stats count as Total by OS Build

By using fillnull, every event will have an OS and a Build value (value is set to "unknown" when it did not have a value).

0 Karma

jip31
Motivator

Many thanks franck

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...