So, I actually figured it out and may have found a splunk bug.
For everyone's info, I actually did scrub some of the info in my search for business purposes. All of my fields are set up like order.subOrderId, order.subOrderName, order.orderId.
It seems that eval in stats doesn't response well to fields with that dot format. When I changed my query to rename the field:
source="a"
| rename order.subOrderName as subOrderName
| transaction order.subOrderId order.orderId startswith="startOrderProcessing" endswith="endOrderProcessing" maxevents=-1 maxspan=10m
| stats count count(eval(subOrderName=="AddSubscriber")) as adds by subOrderName
It worked because I was no longer using dotted field names.
... View more