Splunk Search

Rename a field based on the the value of another field?

the_wolverine
Champion

If I have a table like the following and want to combine the values into a single row for further evaluation, how would I do it?

state,field1, count
ca,abc,200
ca,xyz,100
ca,def,300

I'd like a row that has:
state,abc,xyz,def
ca,200,100,300

0 Karma
1 Solution

sideview
SplunkTrust
SplunkTrust

You actually can just tack on

| xyseries state field1 count

Long Version :

This first table of results you've given is what you might call a "stats style" result set. In other words it looks like the output of | stats count by state field1

state,field1, count
ca,abc,200
ca,xyz,100
ca,def,300

And the second table of results you've given looks like a "chart style" result set, ie it looks like the output of | chart count over state by field1

state,abc,xyz,def
ca,200,100,300

In general, the main function fo the xyseries command is to do exactly this - convert a "stats-style" result set into a "chart style" result set, which is why the answer is simply | xyseries state field1 count

View solution in original post

sideview
SplunkTrust
SplunkTrust

You actually can just tack on

| xyseries state field1 count

Long Version :

This first table of results you've given is what you might call a "stats style" result set. In other words it looks like the output of | stats count by state field1

state,field1, count
ca,abc,200
ca,xyz,100
ca,def,300

And the second table of results you've given looks like a "chart style" result set, ie it looks like the output of | chart count over state by field1

state,abc,xyz,def
ca,200,100,300

In general, the main function fo the xyseries command is to do exactly this - convert a "stats-style" result set into a "chart style" result set, which is why the answer is simply | xyseries state field1 count

the_wolverine
Champion

One way would be to use eval to apply a field value to an existing field name:

| eval {field1}=count

This will give you:

state,abc,xyz,def
ca,200,,
ca,,100,
ca,,,300

Then do: | stats values(abc) as abc, values(xyz) as xyz, values(def) as def by state

state,abc,xyz,def
ca,200,100,300

Get Updates on the Splunk Community!

Community Content Calendar, November Edition

Welcome to the November edition of our Community Spotlight! Each month, we dive into the Splunk Community to ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...