Splunk Search

Change field values into a column using chart command

SarahWKarvenz
Path Finder

I have the following search: stats count by jvm category host

This returns a table with the headings count, jvm, host, category

Category has 4 different values in it and I would like to make those each a column header so that my table would have the headings count, jvm, host, category 1, category 2, category 3, category 4.

I have tried using the chart command to do this. However it will not allow me to group on jvm and host. Regardless of whether I use "chart sum(count) by host,category,jvm" or "chart sum(count) over jvm by host,category" it will not recognize a "third field". "chart sum(count) by host,category" or "chart sum(count) over jvm by host" work just fine.

Any suggestions on how to do this? using either the chart command or something else?
(I am using version 4.3.1)

Thanks!
Sarah

Tags (3)
0 Karma

gkanapathy
Splunk Employee
Splunk Employee

You need something like this:

... | eval hj=host+";"+jvm | chart count by hj,category | eval hj=split(hj,";") | eval host=mvindex(hj,0) | eval jvm=mvindex(hj,1) | fields - hj

which will work regardless of what your category values are.

lguinn2
Legend

Thanks - this is a much better answer! I thought of concatenating the fields, but didn't consider how to split them again after the stats.

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...