Splunk Search

how to sum two fields with empty values in some values of one field

Ahmedkhalil
Communicator

Hello,

i have two fields and want to sum values of them in new field as below

new field = field1 + field2
i have added below expression in props.conf

EVAL-sum_Acct_input= (field1*4)+(field2/1073741824)
problem is that i found event coverage of new field sum_acct_input = event coverage of field1 as field one not exist in all events ( it has empty values ) so how can i overcome this issue ? and also how to make this expression at index time not search time

Tags (1)
0 Karma
1 Solution

somesoni2
Revered Legend

You can utilize "coalesce" function to handle empty/null values of field 1 like below

props.conf

EVAL-sum_Acct_input = (coalesce(field1,0)*4+(field2/1073741824)

Per my knowledge, calculated fields can't be created during index time.

View solution in original post

somesoni2
Revered Legend

You can utilize "coalesce" function to handle empty/null values of field 1 like below

props.conf

EVAL-sum_Acct_input = (coalesce(field1,0)*4+(field2/1073741824)

Per my knowledge, calculated fields can't be created during index time.

martin_mueller
SplunkTrust
SplunkTrust

coalesce(field1, field2) is a nicer way of writing if(isnotnull(field1), field1, field2) - basically, "take the first field from the list of arguments that isn't null".

Ahmedkhalil
Communicator

thanks alot for your help i tested it and worked fine but may i know what excatly coalesce do ?

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...