Splunk Search

Is this the best way to add up all numbers in a given field?

johanupwork
New Member

If I want to add up all numbers I have in the nr_external_recipients field for a particular event type, is this the best way of doing it?

action=email_confirmed | table nr_external_recipients | addcoltotals nr_external_recipients | stats max(nr_external_recipients)

Example event of the type that I want to add up are (this example should show 5):
"action=email_confirmed nr_external_recipients=2"
"action=email_confirmed nr_external_recipients=3"

Tags (2)
0 Karma

sundareshr
Legend

If you want the total as a seperate line/event addcoltotals is your best option. If you're only looking for the total, then you can do stats sum(nr_external_recipients) as total

0 Karma
Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...