Splunk Search

How to get sum of a specific field using eval

mjlsnombrado
Communicator

index=sampleidx
|stats count(eval(value="1")) as total1

How to do this using eval?

0 Karma
1 Solution

493669
Super Champion

Try this:

index=sampleidx
|eventstats count(eval(value="1")) as total1 count(eval(value="2")) as total2|eval total = total1/total2
|stats avg(total) as average by sample

View solution in original post

493669
Super Champion

Try this:

index=sampleidx
|eventstats count(eval(value="1")) as total1 count(eval(value="2")) as total2|eval total = total1/total2
|stats avg(total) as average by sample

mjlsnombrado
Communicator

Thats it thanks 🙂

0 Karma

493669
Super Champion

Try this:

index=sampleidx value="1"|stats count as total1
0 Karma

mjlsnombrado
Communicator

no I cant use that, because I want to get the total count of a specific field value and then get the average for example
|eval totalcount1= (total of value="1")
|eval totalcount2 = (total of value="2")
|eval total = totalcount1/totalcount2
|stats avg(total) as average by sample

0 Karma

493669
Super Champion

why you want to use eval instead of stats ....as stats is better to use

0 Karma
Get Updates on the Splunk Community!

Why You Can't Miss .conf25: Unleashing the Power of Agentic AI with Splunk & Cisco

The Defining Technology Movement of Our Lifetime The advent of agentic AI is arguably the defining technology ...

Deep Dive into Federated Analytics: Unlocking the Full Power of Your Security Data

In today’s complex digital landscape, security teams face increasing pressure to protect sprawling data across ...

Your summer travels continue with new course releases

Summer in the Northern hemisphere is in full swing, and is often a time to travel and explore. If your summer ...