Hi Splunk Team I am having issues while fetching data from 2 stats count fields together. Below is the query: index=test_index | rex "\.(?<TestMQ>.*)\@" | eval Priority_Level=case(P...
...trftime(_time,"%Y/%m/%d %H:%M:%S")
| rex "^.+transactType:\s(?P<transactType>(.\w+)+)"
| stats values(Fecha) as Fecha, values(transactType) as transactType by ID
This is Ok, if i want count t...
Hi, I am having trouble generating a stats report based on JSON data containing an array. I want to produce the following report: ErrorCode ErrorMessage Count 212 The image quality i...
Hi Everyone I was wondering how I would go about a stats count for 2 fields where 1 field depends on the other. So for example we have a field called service version and another called s...
Hello Splunkers I can use stats count and visualize the output as a single value so its nice and big in that panel in my dashboard. Is there a way to visualize the output from stats(sum) in a s...
...ransaction_Details ABC Shopping CDE Rent From my splunk index i am running Stats command like below (Tran from index = Tran_lookup) from count(Tran) as count , Avg( r...
Hello Splunkers!! Every week, my report runs and gathers the results under the summary index=analyst. You can see that several stash files are being created for the specific report in the screenshot...