Splunk Dev

Query many fields with the same part in the name

amielke
Communicator

Hi,

i have events in one sourcetype with over 90 similar fields like field1, field2 ... field90.

I can write a query like: search index=a sourcetype=2 field1=* field2=* ..field90=* | stats min(field1), max(field1, min(field2), max(field2)

is there a way reduce the long query to something like: index=a sourcetype=2 field*=* | stats min(field*) max(field*) ?

THX

Tags (1)
0 Karma
1 Solution

HiroshiSatoh
Champion

If _raw has a field

index=a sourcetype=2 "field*=*"|stats min(field*) as min_field* max(field*) as max_field*

※You can use wild cards for stats.

View solution in original post

HiroshiSatoh
Champion

If _raw has a field

index=a sourcetype=2 "field*=*"|stats min(field*) as min_field* max(field*) as max_field*

※You can use wild cards for stats.

amielke
Communicator

index=a sourcetype=2 |stats min(field*) as min_field* max(field*) as max_field*

Works fine, Thank you 🙂

0 Karma

woodcock
Esteemed Legend

Be sure to click Accept to close the question.

0 Karma
Get Updates on the Splunk Community!

Credit Card Data Protection & PCI Compliance with Splunk Edge Processor

Organizations handling credit card transactions know that PCI DSS compliance is both critical and complex. The ...

Stay Connected: Your Guide to July Tech Talks, Office Hours, and Webinars!

What are Community Office Hours?Community Office Hours is an interactive 60-minute Zoom series where ...

Updated Data Type Articles, Anniversary Celebrations, and More on Splunk Lantern

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...