<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Timechart based on field value (aggregated event count) rather than number of events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Timechart-based-on-field-value-aggregated-event-count-rather/m-p/44350#M179182</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I get events from a source which already aggregates events. Examples:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Apr 24 2012 09:59:59,event_name=FWALL: Matched By Firewall, event_count=5,src_ip=199.80.55.144,src_port=80,src_country=Hong Kong,dst_ip=192.168.1.2,dst_port=22628,dst_country=Switzerland,action=mitigate,proto=TCP

Apr 24 2012 09:59:59,event_name=PROTO: HTTP Header Section Too Long, event_count=11,src_ip=212.71.127.101,src_port=80,src_country=Switzerland,dst_ip=192.168.1.2,dst_port=52003,dst_country=Switzerland,action=monitor,proto=TCP
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So for statistics on total event count I need to evaluate / sum the number in the event_count field.&lt;BR /&gt;
So how can I timechart on event_name but evaluate the event_count field rather than the actual number of events collected?&lt;/P&gt;

&lt;P&gt;Thanks !&lt;/P&gt;</description>
    <pubDate>Sat, 05 May 2012 09:03:39 GMT</pubDate>
    <dc:creator>flle</dc:creator>
    <dc:date>2012-05-05T09:03:39Z</dc:date>
    <item>
      <title>Timechart based on field value (aggregated event count) rather than number of events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Timechart-based-on-field-value-aggregated-event-count-rather/m-p/44350#M179182</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I get events from a source which already aggregates events. Examples:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Apr 24 2012 09:59:59,event_name=FWALL: Matched By Firewall, event_count=5,src_ip=199.80.55.144,src_port=80,src_country=Hong Kong,dst_ip=192.168.1.2,dst_port=22628,dst_country=Switzerland,action=mitigate,proto=TCP

Apr 24 2012 09:59:59,event_name=PROTO: HTTP Header Section Too Long, event_count=11,src_ip=212.71.127.101,src_port=80,src_country=Switzerland,dst_ip=192.168.1.2,dst_port=52003,dst_country=Switzerland,action=monitor,proto=TCP
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So for statistics on total event count I need to evaluate / sum the number in the event_count field.&lt;BR /&gt;
So how can I timechart on event_name but evaluate the event_count field rather than the actual number of events collected?&lt;/P&gt;

&lt;P&gt;Thanks !&lt;/P&gt;</description>
      <pubDate>Sat, 05 May 2012 09:03:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Timechart-based-on-field-value-aggregated-event-count-rather/m-p/44350#M179182</guid>
      <dc:creator>flle</dc:creator>
      <dc:date>2012-05-05T09:03:39Z</dc:date>
    </item>
    <item>
      <title>Re: Timechart based on field value (aggregated event count) rather than number of events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Timechart-based-on-field-value-aggregated-event-count-rather/m-p/44351#M179183</link>
      <description>&lt;P&gt;If you want the sum of the values in the &lt;CODE&gt;event_count&lt;/CODE&gt; field for some interval, just use the statistical function &lt;CODE&gt;sum&lt;/CODE&gt;.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | timechart sum(event_count) by event_name
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 05 May 2012 09:30:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Timechart-based-on-field-value-aggregated-event-count-rather/m-p/44351#M179183</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-05-05T09:30:50Z</dc:date>
    </item>
  </channel>
</rss>

