Splunk Search

Adding another column to table

anthony_king
Engager

Hello,

 

I am trying to add another index column to this table. Currently using the search below.

| tstats count where index IN (network) by _time span=1h
| rename count as Network_Logs
| eval _time=strftime(_time, "%m-%d %H:%M")

Screenshot splunk.png

| tstats count where index IN (network, proxy) by _time span=1h
| rename count as Network_Logs
| eval _time=strftime(_time, "%m-%d %H:%M")

 

Adding another index such as proxy doesn't seem to work just adds to the total count. Is there anyway to count separate indexes by 1 hour intervals?

Labels (1)
0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

You have to split by index as well. Try this

| tstats count where index IN (network, proxy) by _time span=1h index
| timechart span=1h max(count) by index

The tstats will give you an index column as well as count, then the timechart will convert that to a timechart. Note that you need to use max(count) here.

Note you can also do this simply with tstats using prestats and chart, i.e.

| tstats prestats=t count where index IN (network, proxy) by _time span=1h index
| chart count by _time index

This way you just use chart count and you don't need the max.

View solution in original post

anthony_king
Engager

That worked. Thank you for the help!

0 Karma

bowesmana
SplunkTrust
SplunkTrust

You have to split by index as well. Try this

| tstats count where index IN (network, proxy) by _time span=1h index
| timechart span=1h max(count) by index

The tstats will give you an index column as well as count, then the timechart will convert that to a timechart. Note that you need to use max(count) here.

Note you can also do this simply with tstats using prestats and chart, i.e.

| tstats prestats=t count where index IN (network, proxy) by _time span=1h index
| chart count by _time index

This way you just use chart count and you don't need the max.

PickleRick
SplunkTrust
SplunkTrust

You can also use the tstats with prestats with count.

| tstats prestats=t count where index IN (network,proxy) by index _time span=1h
| timechart span=1h count by index

 

Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...