Splunk Dev

Query many fields with the same part in the name

amielke
Communicator

Hi,

i have events in one sourcetype with over 90 similar fields like field1, field2 ... field90.

I can write a query like: search index=a sourcetype=2 field1=* field2=* ..field90=* | stats min(field1), max(field1, min(field2), max(field2)

is there a way reduce the long query to something like: index=a sourcetype=2 field*=* | stats min(field*) max(field*) ?

THX

Tags (1)
0 Karma
1 Solution

HiroshiSatoh
Champion

If _raw has a field

index=a sourcetype=2 "field*=*"|stats min(field*) as min_field* max(field*) as max_field*

※You can use wild cards for stats.

View solution in original post

HiroshiSatoh
Champion

If _raw has a field

index=a sourcetype=2 "field*=*"|stats min(field*) as min_field* max(field*) as max_field*

※You can use wild cards for stats.

amielke
Communicator

index=a sourcetype=2 |stats min(field*) as min_field* max(field*) as max_field*

Works fine, Thank you 🙂

0 Karma

woodcock
Esteemed Legend

Be sure to click Accept to close the question.

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...