Splunk Search

format splunk table

edookati
Path Finder

I have 3 fields date, hour & count(X). can someone please tell me how to forma table like below...count of X

      date1       date2 

Hour1 count(X) count(X)
Hour2 count(X) count(X)

Thanks.

Tags (1)
0 Karma
1 Solution

somesoni2
Revered Legend

I am assuming you have some aggregation command like "stats" to get those three columns. If that is the case I would recommend to rename the "count(X)" as countX or something similar.

Try this

Your base search giving date, hour , countX fields | chart sum(countX) as countX over hour by date

OR

Your base search giving date, hour, X fields | chart count(X) as countX over hour by date

OR

your base search giving date, hour, count(X) fields | chart sum("count(X)") as countX over hour by date

View solution in original post

somesoni2
Revered Legend

I am assuming you have some aggregation command like "stats" to get those three columns. If that is the case I would recommend to rename the "count(X)" as countX or something similar.

Try this

Your base search giving date, hour , countX fields | chart sum(countX) as countX over hour by date

OR

Your base search giving date, hour, X fields | chart count(X) as countX over hour by date

OR

your base search giving date, hour, count(X) fields | chart sum("count(X)") as countX over hour by date

edookati
Path Finder

fantastic. It worked.
Thanks.

0 Karma
Get Updates on the Splunk Community!

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...