Quantcast
Channel: Questions in topic: "splunk-enterprise"
Viewing all articles
Browse latest Browse all 47296

I want to display the results as zero when there is no events in a timerange for filtered fields in search

$
0
0
I have put few IP's in the filter and have created filed for those IP's but when they die in the statistics not returning as zero rather its showing nothing, its showing only the IP's that has count. Please advise. Please find the below search and attached screenshot. It shows only the filed has value. Not showing as zero event count the fields does not have events. index=blu cs_host="collector*.abc.com" c_ip=10.xx.xx.233 OR c_ip=10.xx.xx.234 OR c_ip=10.xx.xx.248 OR c_ip=10.xx.xx.250 OR c_ip=10.xx.xx.42 OR c_ip=10.xx.xx.43 |stats count by c_ip|fillnull

Viewing all articles
Browse latest Browse all 47296

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>