Splunk Search

how to use part of field name to group columns and add values?

hannahb
New Member

Hi, I got a set of table that has "_time" as row values and "hosts" as  column values like below.

_timehost-1-1host-1-2host-2-1host-2-2
12:00102055
12:152010515
12:301015510


How can I group them based on their host name (host-1 & host-2) and add the values of two sub_hosts(e.g.  "host-1" = "host-1-1" + "host-1-2")? So the result will look like below.

_timehost-1host-2
12:003010
12:153020
12:302515
Labels (4)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Run-anywhere example:

 

| makeresults 
| eval _raw="time,host-1-1,host-1-2,host-2-1,host-2-2
12:00,10,20,5,5
12:15,20,10,5,15
12:30,10,15,5,10"
| multikv forceheader=1
| fields - _* linecount 
| rename host_*_* as host-*-*


| untable time host count
| eval host=mvjoin(mvindex(split(host,"-"),0,-2),"-")
| stats sum(count) as count by time host
| xyseries time host count

 

For your case, you need the lines after the blank lines and use _time instead of time

0 Karma

aasabatini
Motivator

Hi @hannahb 

Try This:

 

------your search | rename host1-1 as host1, host2-1 as host2 | rename host1-2 as host1, host2-2 as host2 | stats count(host1) as host1, count(host2) as host2 by _time

 

“The answer is out there, Neo, and it’s looking for you, and it will find you if you want it to.”
0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...