Splunk Search

Splunk stats count for several search

vintik
Engager

Hello,

I have ~15 the same queries with a little difference:

(index=SOME_INDEX sourcetype=SOME_SOURCE source=... 
| eval API=CASE(searchmatch("xxx"), "yyy", ...) 
| search API=WebResponse
| eval Status=case(...) 
| stats avg(dur) AS Avg by status_code
| stats count by status_code

...

(index=SOME_INDEX sourcetype=SOME_SOURCE source=... 
| eval API=CASE(searchmatch("xxx"), "yyy", ...) 
| search API=AppResponse
| eval Status=case(...) 
| stats avg(dur) AS Avg by status_code
| stats count by status_code

So, all my queries are different only in one place - | search API=XXX and return result like:

| status_code | count |
|  201        |  10   |
|  404        |  28   |
etc

How I can combine all above queries into one and get result as (or something like this):

    | status_code | count(AppResponse) | count(WebResponse) | count(Other) |
    |  201        |  10                |  0                  |  0   |
    |  404        |  28                |  3                  |   0  |

?

0 Karma

somesoni2
Revered Legend

Try this (there were two stats at the end of your search in question which seems wrong to me, because count will always be 1 in second stats.

(index=SOME_INDEX sourcetype=SOME_SOURCE source=... 
 | eval API=CASE(searchmatch("xxx"), "yyy", ...) 
 | search API=WebResponse
 | eval Status=case(...) 
 | chart count AS Avg by status_code API
0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...