Splunk Search

How to sum values from Splunk log data?

pk555
New Member

My Splunk log is coming in this format:

\"amountLabel\":\"Amount\",\"amountValue\":\"6000.00\",\"sentOrDepositLabel\".......

I want to sum the values of 'amountValue' field and show it in a table for a specified period of time. Please let me know how can I do it.

0 Karma
1 Solution

kthammireddygar
Path Finder

First extract the amountValue field.

Link to Regex: https://regex101.com/r/UcePur/1

SearchString: index=foo sourcetype=xyz ....|timechart span=1h sum(amountValue) AS TotalSum

hope this helps

View solution in original post

0 Karma

kthammireddygar
Path Finder

First extract the amountValue field.

Link to Regex: https://regex101.com/r/UcePur/1

SearchString: index=foo sourcetype=xyz ....|timechart span=1h sum(amountValue) AS TotalSum

hope this helps

0 Karma

HiroshiSatoh
Champion

Aggregation uses stats.

| stats sum(amountValue)

If you extract the field with the search sentence

| extract pairdelim=",", kvdelim=":"
| stats sum(amountValue)

Refer to the manual for how to set field extraction.
http://docs.splunk.com/Documentation/Splunk/7.1.2/Knowledge/ExtractfieldsinteractivelywithIFX

0 Karma
Get Updates on the Splunk Community!

Exciting News: The AppDynamics Community Joins Splunk!

Hello Splunkers,   I’d like to introduce myself—I’m Ryan, the former AppDynamics Community Manager, and I’m ...

The All New Performance Insights for Splunk

Splunk gives you amazing tools to analyze system data and make business-critical decisions, react to issues, ...

Good Sourcetype Naming

When it comes to getting data in, one of the earliest decisions made is what to use as a sourcetype. Often, ...