Splunk Search

How to get sum of a specific field using eval

mjlsnombrado
Communicator

index=sampleidx
|stats count(eval(value="1")) as total1

How to do this using eval?

0 Karma
1 Solution

493669
Super Champion

Try this:

index=sampleidx
|eventstats count(eval(value="1")) as total1 count(eval(value="2")) as total2|eval total = total1/total2
|stats avg(total) as average by sample

View solution in original post

493669
Super Champion

Try this:

index=sampleidx
|eventstats count(eval(value="1")) as total1 count(eval(value="2")) as total2|eval total = total1/total2
|stats avg(total) as average by sample

mjlsnombrado
Communicator

Thats it thanks 🙂

0 Karma

493669
Super Champion

Try this:

index=sampleidx value="1"|stats count as total1
0 Karma

mjlsnombrado
Communicator

no I cant use that, because I want to get the total count of a specific field value and then get the average for example
|eval totalcount1= (total of value="1")
|eval totalcount2 = (total of value="2")
|eval total = totalcount1/totalcount2
|stats avg(total) as average by sample

0 Karma

493669
Super Champion

why you want to use eval instead of stats ....as stats is better to use

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...