Splunk Search

help on stats count by command

jip31
Motivator

hello

I use the search below in order to do a total count by OS and by build
It mean that it counts only events which have a build AND an OS
I would like to do another count but this time I would like to do a total count of events which have a build OR an OS
Could you help me please??

eventtype="AppliEV" | fields Name, Level, host 
| dedup host 
| stats count by host 
| join host type="outer" 
    [ search index="x" sourcetype=x key_path="x" 
        OR 
        key_path="x" 
    | eval OS=if(key_path=="x"), 
        Build=if(key_path=="x" 
    | stats latest(OS) as OS latest(Build) as Build by host] 
| stats values(OS) as OS values(Build) as Build by host 
| stats count as Total by OS Build
Tags (1)
0 Karma
1 Solution

FrankVl
Ultra Champion

One way to approach that would be:

 eventtype="AppliEV" | fields Name, Level, host 
 | dedup host 
 | stats count by host 
 | join host type="outer" 
     [ search index="x" sourcetype=x key_path="x" 
         OR 
         key_path="x" 
     | eval OS=if(key_path=="x"), 
         Build=if(key_path=="x" 
     | stats latest(OS) as OS latest(Build) as Build by host] 
 | stats values(OS) as OS values(Build) as Build by host 
 | fillnull value="unknown" OS,Build
 | stats count as Total by OS Build

By using fillnull, every event will have an OS and a Build value (value is set to "unknown" when it did not have a value).

View solution in original post

0 Karma

FrankVl
Ultra Champion

One way to approach that would be:

 eventtype="AppliEV" | fields Name, Level, host 
 | dedup host 
 | stats count by host 
 | join host type="outer" 
     [ search index="x" sourcetype=x key_path="x" 
         OR 
         key_path="x" 
     | eval OS=if(key_path=="x"), 
         Build=if(key_path=="x" 
     | stats latest(OS) as OS latest(Build) as Build by host] 
 | stats values(OS) as OS values(Build) as Build by host 
 | fillnull value="unknown" OS,Build
 | stats count as Total by OS Build

By using fillnull, every event will have an OS and a Build value (value is set to "unknown" when it did not have a value).

0 Karma

jip31
Motivator

Many thanks franck

0 Karma
Get Updates on the Splunk Community!

Splunk App for Anomaly Detection End of Life Announcment

Q: What is happening to the Splunk App for Anomaly Detection?A: Splunk is officially announcing the ...

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...