Splunk Dev

Query many fields with the same part in the name

amielke
Communicator

Hi,

i have events in one sourcetype with over 90 similar fields like field1, field2 ... field90.

I can write a query like: search index=a sourcetype=2 field1=* field2=* ..field90=* | stats min(field1), max(field1, min(field2), max(field2)

is there a way reduce the long query to something like: index=a sourcetype=2 field*=* | stats min(field*) max(field*) ?

THX

Tags (1)
0 Karma
1 Solution

HiroshiSatoh
Champion

If _raw has a field

index=a sourcetype=2 "field*=*"|stats min(field*) as min_field* max(field*) as max_field*

※You can use wild cards for stats.

View solution in original post

HiroshiSatoh
Champion

If _raw has a field

index=a sourcetype=2 "field*=*"|stats min(field*) as min_field* max(field*) as max_field*

※You can use wild cards for stats.

amielke
Communicator

index=a sourcetype=2 |stats min(field*) as min_field* max(field*) as max_field*

Works fine, Thank you 🙂

0 Karma

woodcock
Esteemed Legend

Be sure to click Accept to close the question.

0 Karma
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...