Hi - Very new to splunk.
I have the following query that gives me total count for a specific log:
LOGGING string: "log msg: stuff=<either blank="" or="" has="" a="" string="" literal="" value="">"
from this query I can get total by matching "log msg":
source=*/logs/stdout.log classname=Log "log msg" | stats count
However, I want to get that count as well the count for "stuff" where stuff=""
How can I modify the query above to get the total count for "log msg" and total count where stuff is empty string...(as a next ask possibly display in a stacked bar chart?) But raw data is fine for now.