Splunk Search

Stats Count(Eval) doesn't return expected result

Luckless
Engager

I have this test search (I know the result is not all that useful, just playing with eval and trying to figure out what I'm doing wrong):

source="a" 
| transaction  subOrderId orderId startswith="startOrderProcessing" endswith="endOrderProcessing" maxevents=-1 maxspan=10m 
| stats count count(eval(subOrderName=="AddSubscriber")) as adds by subOrderName

Here is the resulting stats:

subOrderName        count   adds

AddSubscriber         16       0
DeleteSubscriber        6      0
Reconnect              1       0
ValidatePortability      3     0 

So I can tell stats sees the subOrderName field and that it can properly count how many of each transaction is processing. Why is the first row's last column not populated??? Is my understanding of count(eval) incorrect?

After I get this working, my end goal is to find the net adds (in this case, net adds would be 10).

Tags (3)
0 Karma
1 Solution

Luckless
Engager

So, I actually figured it out and may have found a splunk bug.

For everyone's info, I actually did scrub some of the info in my search for business purposes. All of my fields are set up like order.subOrderId, order.subOrderName, order.orderId.

It seems that eval in stats doesn't response well to fields with that dot format. When I changed my query to rename the field:

 source="a"
| rename order.subOrderName as subOrderName
| transaction order.subOrderId order.orderId startswith="startOrderProcessing" endswith="endOrderProcessing" maxevents=-1 maxspan=10m
| stats count count(eval(subOrderName=="AddSubscriber")) as adds by subOrderName

It worked because I was no longer using dotted field names.

View solution in original post

Luckless
Engager

So, I actually figured it out and may have found a splunk bug.

For everyone's info, I actually did scrub some of the info in my search for business purposes. All of my fields are set up like order.subOrderId, order.subOrderName, order.orderId.

It seems that eval in stats doesn't response well to fields with that dot format. When I changed my query to rename the field:

 source="a"
| rename order.subOrderName as subOrderName
| transaction order.subOrderId order.orderId startswith="startOrderProcessing" endswith="endOrderProcessing" maxevents=-1 maxspan=10m
| stats count count(eval(subOrderName=="AddSubscriber")) as adds by subOrderName

It worked because I was no longer using dotted field names.

Get Updates on the Splunk Community!

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

A Guide To Cloud Migration Success

As enterprises’ rapid expansion to the cloud continues, IT leaders are continuously looking for ways to focus ...

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...