Splunk Search

List sum of fields across events

twinspop
Influencer

This seems like it would be easy. Maybe it is, and I'm being thick today. 😕

Log lines look like

... server1 qs_queue1=50 qs_queue3=60 qs_queue10=100
... server2 qs_queue4=50 qs_queue6=10 qs_queue10=150
... server3 qs_queue1=20 qs_queue4=70 qs_queue3=150

I want to create a chart that will list each distinct qs_* field in rows with the sum of all values for that particular qs_ field in the searched time frame listed next to it:

qs_queue10    250
qs_queue1     70
qs_queue4     120

... etc.

The chart command

... | chart sum(qs_*)

charts in the wrong orientation in 2 rows, with the qs_ fields along the top row, and their values in the 2nd row. Same data being displayed, but in a far less presentable way.

TIA, jon

1 Solution

gkanapathy
Splunk Employee
Splunk Employee
... | stats sum(qs_*) | transpose

should do it.

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee
... | stats sum(qs_*) | transpose

should do it.

twinspop
Influencer

Crikey, should have found that. Thanks!

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...