Knowledge Management

sitimechart

SaharElmakias
Engager

Hello,

While using sitimechart instead of timechart - The data has been changed.
I would like to calculate an error percentage but the system shows 0 or fields count.

Thanks!

SaharElmakias_0-1713080724502.png

SaharElmakias_1-1713080742482.png

 

 

Labels (2)
Tags (1)
0 Karma
1 Solution

marnall
Builder


If you would just like to make a timechart, then the timechart command should fit your need better than the sitimechart command. The sitimechart is intended for preparing the data to insert into a summary index so that later on it can be timecharted from the summary index.

Using just timechart:

 

<your search>
| timechart span=1d avg(errorPercentage) as errorPercentage by Process

 

If you would like to gather data now into a summary index to produce a timechart very quickly in a later search, you can use sitimechart:

 

<your search>
| sitimechart span=1d avg(errorPercentage) as errorPercentage by Process
| collect index=yoursummaryindex

 

Then in a later search:

 

index = yoursummaryindex <some filter, e.g. for Process=*>
| timechart span=1d avg(errorPercentage) as errorPercentage by Process

 

The docs page describes the sitimechart usage, but does not explain the meaning of the created fields: https://docs.splunk.com/Documentation/Splunk/9.2.0/SearchReference/Sitimechart

View solution in original post

0 Karma

marnall
Builder


If you would just like to make a timechart, then the timechart command should fit your need better than the sitimechart command. The sitimechart is intended for preparing the data to insert into a summary index so that later on it can be timecharted from the summary index.

Using just timechart:

 

<your search>
| timechart span=1d avg(errorPercentage) as errorPercentage by Process

 

If you would like to gather data now into a summary index to produce a timechart very quickly in a later search, you can use sitimechart:

 

<your search>
| sitimechart span=1d avg(errorPercentage) as errorPercentage by Process
| collect index=yoursummaryindex

 

Then in a later search:

 

index = yoursummaryindex <some filter, e.g. for Process=*>
| timechart span=1d avg(errorPercentage) as errorPercentage by Process

 

The docs page describes the sitimechart usage, but does not explain the meaning of the created fields: https://docs.splunk.com/Documentation/Splunk/9.2.0/SearchReference/Sitimechart

0 Karma
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...