Monitoring Splunk

Splunk dashboard


Hi Team,

When I did below search, I am getting the count of event details under "Null" column name. 

index=main|search query|timechart span=5m count by events 


_time                     Null

06/10/2021.        200

But instead of column name as null, I need some other alias name.How to do that?

Labels (1)
0 Karma



Is this Null value expected? It seems that the "events" field is not find in your search results and because of this it is returning the results as Null.

If this value is expected and you want to rename the Null column you could append the following to your search.


| rename Null as <field_alias>


0 Karma
Get Updates on the Splunk Community!

.conf23 Registration is Now Open!

Time to toss the .conf-etti &#x1f389; —  .conf23 registration is open!   Join us in Las Vegas July 17-20 for ...

Don't wait! Accept the Mission Possible: Splunk Adoption Challenge Now and Win ...

Attention everyone! We have exciting news to share! We are recruiting new members for the Mission Possible: ...

Unify Your SecOps with Splunk Mission Control

In today’s post, I'm excited to share some recent Splunk Mission Control innovations. With Splunk Mission ...