Splunk Search

Stats Count(Eval) doesn't return expected result

Luckless
Engager

I have this test search (I know the result is not all that useful, just playing with eval and trying to figure out what I'm doing wrong):

source="a" 
| transaction  subOrderId orderId startswith="startOrderProcessing" endswith="endOrderProcessing" maxevents=-1 maxspan=10m 
| stats count count(eval(subOrderName=="AddSubscriber")) as adds by subOrderName

Here is the resulting stats:

subOrderName        count   adds

AddSubscriber         16       0
DeleteSubscriber        6      0
Reconnect              1       0
ValidatePortability      3     0 

So I can tell stats sees the subOrderName field and that it can properly count how many of each transaction is processing. Why is the first row's last column not populated??? Is my understanding of count(eval) incorrect?

After I get this working, my end goal is to find the net adds (in this case, net adds would be 10).

Tags (3)
0 Karma
1 Solution

Luckless
Engager

So, I actually figured it out and may have found a splunk bug.

For everyone's info, I actually did scrub some of the info in my search for business purposes. All of my fields are set up like order.subOrderId, order.subOrderName, order.orderId.

It seems that eval in stats doesn't response well to fields with that dot format. When I changed my query to rename the field:

 source="a"
| rename order.subOrderName as subOrderName
| transaction order.subOrderId order.orderId startswith="startOrderProcessing" endswith="endOrderProcessing" maxevents=-1 maxspan=10m
| stats count count(eval(subOrderName=="AddSubscriber")) as adds by subOrderName

It worked because I was no longer using dotted field names.

View solution in original post

Luckless
Engager

So, I actually figured it out and may have found a splunk bug.

For everyone's info, I actually did scrub some of the info in my search for business purposes. All of my fields are set up like order.subOrderId, order.subOrderName, order.orderId.

It seems that eval in stats doesn't response well to fields with that dot format. When I changed my query to rename the field:

 source="a"
| rename order.subOrderName as subOrderName
| transaction order.subOrderId order.orderId startswith="startOrderProcessing" endswith="endOrderProcessing" maxevents=-1 maxspan=10m
| stats count count(eval(subOrderName=="AddSubscriber")) as adds by subOrderName

It worked because I was no longer using dotted field names.

Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...