Splunk Search

how do I add an upper row with count eval?

3DGjos
Communicator

Hello, i'm doing a report (splunk 7.3) in which I need to append some counts in the first row of the table im generating.

this is my query:

myquery | dedup ID| eval DLP_installed=if(match(myDLPTAG, "yes", "no"), DLP_rules_installed=if(match(myDLPrules, "yes", "no") |  stats values(DLP_installed) as dlpinstalled values(DLP_rules_installed) as "rules_installed" values(Tags) AS Tags by ID, FQDN

I need to append a row containing count(eval(DLP_installed=="yes")) as first row.

any ideas?

Thanks

0 Karma

adonio
Ultra Champion

do you mean something like below?

.... | eventstats count(eval(DLP_installed=="yes")) as instlled_count ... then use the new field as you see fit

3DGjos
Communicator

Thanks for your answer!
but, with eventstats only the count fields appear as columns repeating the same information for every row.

I need them to appear as the upper row

0 Karma

adonio
Ultra Champion

yes ... just finish it off with your ... | stats ....

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...