Splunk Search

Set values to 0 when there are no search results

mborn
New Member

Hi,

on Splunk Enterprise 6.6.5 I have the following problem:
I am using 3 saved searches in one dashboard via appendcols and have additional columns where I use the output from the saved searches to compute new values. However, for one search the column frequently stays blank asthere are no results in the chosen time frame instead of showing zeroes and so do the columns corresponding to searches using the empty column.
I would like to fill the empty column with zeroes and have the other columns use 0 as a value for their computations. filnull does not seem to help here.

Any help is much appreciated!

Thanks!

0 Karma

horsefez
Motivator

Hi mborn,

you can also go for something like this.

<yoursearch> | eval <nameoffield>=if(isnull(<nameoffield>), "0", <nameoffield>)

mborn
New Member

Hi pyro_wood,

thanks for the help! While that suggestion did not quite do the trick (the result was the same in the end) I could figure out a way going from there. The search which lead to the column being filled with zeroes was:

| savedsearch | appendcols [ | savedsearch | appendpipe [ stats count | where count==0 | eval =0 | table ] ] | fillnull.

0 Karma

pradeepkumarg
Influencer

Can you explain more on why fillnull doesn't work for you? Make sure you do the fillnull prior to your computations and not at the end.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...