Splunk Search

How to sum two fields ?

aymericbrun
Explorer

Hello,

How can i sum fields to have the total in a new field ?
For example, i have a field called (BytesReceivedPerSec) and i would have the sum of this field for all the event (in realtime)

I tried accum BytesReceivedPersec AS bytesrcvdtotal but i doesn't do a total sum of all the bytes received.

Have you an idea ?

Thanks

Tags (1)
0 Karma
1 Solution

Ant1D
Motivator

Try the following search:

index=Your_Index | stats sum(BytesReceivedPerSec) AS bytes_total

View solution in original post

0 Karma

aymericbrun
Explorer

Thank you very much 🙂

It works perfectly

my search exactly :

host=hp-dev index="main"| stats sum(BytesReceivedPersec) AS octets_recus sum(BytesSentPersec) AS octets_envoyes | eval octets_recus_Mo=octets_recus / 1000000 | eval octets_envoyes_Mo=octets_envoyes / 1000000

0 Karma

Ant1D
Motivator

Glad to help 🙂

0 Karma

Ant1D
Motivator

Try the following search:

index=Your_Index | stats sum(BytesReceivedPerSec) AS bytes_total

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...

Share Your Feedback: On Admin Config Service (ACS)!

Help Us Build a Better Admin Config Service Experience (ACS)   We Want Your Feedback on Admin Config Service ...