Splunk Search

Adding another column to table

anthony_king
Engager

Hello,

 

I am trying to add another index column to this table. Currently using the search below.

| tstats count where index IN (network) by _time span=1h
| rename count as Network_Logs
| eval _time=strftime(_time, "%m-%d %H:%M")

Screenshot splunk.png

| tstats count where index IN (network, proxy) by _time span=1h
| rename count as Network_Logs
| eval _time=strftime(_time, "%m-%d %H:%M")

 

Adding another index such as proxy doesn't seem to work just adds to the total count. Is there anyway to count separate indexes by 1 hour intervals?

Labels (1)
0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

You have to split by index as well. Try this

| tstats count where index IN (network, proxy) by _time span=1h index
| timechart span=1h max(count) by index

The tstats will give you an index column as well as count, then the timechart will convert that to a timechart. Note that you need to use max(count) here.

Note you can also do this simply with tstats using prestats and chart, i.e.

| tstats prestats=t count where index IN (network, proxy) by _time span=1h index
| chart count by _time index

This way you just use chart count and you don't need the max.

View solution in original post

anthony_king
Engager

That worked. Thank you for the help!

0 Karma

bowesmana
SplunkTrust
SplunkTrust

You have to split by index as well. Try this

| tstats count where index IN (network, proxy) by _time span=1h index
| timechart span=1h max(count) by index

The tstats will give you an index column as well as count, then the timechart will convert that to a timechart. Note that you need to use max(count) here.

Note you can also do this simply with tstats using prestats and chart, i.e.

| tstats prestats=t count where index IN (network, proxy) by _time span=1h index
| chart count by _time index

This way you just use chart count and you don't need the max.

PickleRick
SplunkTrust
SplunkTrust

You can also use the tstats with prestats with count.

| tstats prestats=t count where index IN (network,proxy) by index _time span=1h
| timechart span=1h count by index

 

Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...