Splunk Search

how do I add an upper row with count eval?

3DGjos
Communicator

Hello, i'm doing a report (splunk 7.3) in which I need to append some counts in the first row of the table im generating.

this is my query:

myquery | dedup ID| eval DLP_installed=if(match(myDLPTAG, "yes", "no"), DLP_rules_installed=if(match(myDLPrules, "yes", "no") |  stats values(DLP_installed) as dlpinstalled values(DLP_rules_installed) as "rules_installed" values(Tags) AS Tags by ID, FQDN

I need to append a row containing count(eval(DLP_installed=="yes")) as first row.

any ideas?

Thanks

0 Karma

adonio
Ultra Champion

do you mean something like below?

.... | eventstats count(eval(DLP_installed=="yes")) as instlled_count ... then use the new field as you see fit

3DGjos
Communicator

Thanks for your answer!
but, with eventstats only the count fields appear as columns repeating the same information for every row.

I need them to appear as the upper row

0 Karma

adonio
Ultra Champion

yes ... just finish it off with your ... | stats ....

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...