Splunk Search

List sum of fields across events

twinspop
Influencer

This seems like it would be easy. Maybe it is, and I'm being thick today. 😕

Log lines look like

... server1 qs_queue1=50 qs_queue3=60 qs_queue10=100
... server2 qs_queue4=50 qs_queue6=10 qs_queue10=150
... server3 qs_queue1=20 qs_queue4=70 qs_queue3=150

I want to create a chart that will list each distinct qs_* field in rows with the sum of all values for that particular qs_ field in the searched time frame listed next to it:

qs_queue10    250
qs_queue1     70
qs_queue4     120

... etc.

The chart command

... | chart sum(qs_*)

charts in the wrong orientation in 2 rows, with the qs_ fields along the top row, and their values in the 2nd row. Same data being displayed, but in a far less presentable way.

TIA, jon

1 Solution

gkanapathy
Splunk Employee
Splunk Employee
... | stats sum(qs_*) | transpose

should do it.

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee
... | stats sum(qs_*) | transpose

should do it.

twinspop
Influencer

Crikey, should have found that. Thanks!

0 Karma
Get Updates on the Splunk Community!

New Release | Splunk Cloud Platform 10.1.2507

Hello Splunk Community!We are thrilled to announce the General Availability of Splunk Cloud Platform 10.1.2507 ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...

Splunk New Course Releases for a Changing World

Every day, the world feels like it’s moving faster with new technological breakthroughs, AI innovation, and ...