Splunk Search

how to use part of field name to group columns and add values?

hannahb
New Member

Hi, I got a set of table that has "_time" as row values and "hosts" as  column values like below.

_timehost-1-1host-1-2host-2-1host-2-2
12:00102055
12:152010515
12:301015510


How can I group them based on their host name (host-1 & host-2) and add the values of two sub_hosts(e.g.  "host-1" = "host-1-1" + "host-1-2")? So the result will look like below.

_timehost-1host-2
12:003010
12:153020
12:302515
Labels (4)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Run-anywhere example:

 

| makeresults 
| eval _raw="time,host-1-1,host-1-2,host-2-1,host-2-2
12:00,10,20,5,5
12:15,20,10,5,15
12:30,10,15,5,10"
| multikv forceheader=1
| fields - _* linecount 
| rename host_*_* as host-*-*


| untable time host count
| eval host=mvjoin(mvindex(split(host,"-"),0,-2),"-")
| stats sum(count) as count by time host
| xyseries time host count

 

For your case, you need the lines after the blank lines and use _time instead of time

0 Karma

aasabatini
Motivator

Hi @hannahb 

Try This:

 

------your search | rename host1-1 as host1, host2-1 as host2 | rename host1-2 as host1, host2-2 as host2 | stats count(host1) as host1, count(host2) as host2 by _time

 

“The answer is out there, Neo, and it’s looking for you, and it will find you if you want it to.”
0 Karma
Get Updates on the Splunk Community!

Enhance Your Splunk App Development: New Tools & Support

UCC FrameworkAdd-on Builder has been around for quite some time. It helps build Splunk apps faster, but it ...

Prove Your Splunk Prowess at .conf25—No Prereqs Required!

Your Next Big Security Credential: No Prerequisites Needed We know you’ve got the skills, and now, earning the ...

Splunk Observability Cloud's AI Assistant in Action Series: Observability as Code

This is the sixth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how to ...