Monitoring Splunk

Splunk dashboard

Als123
Explorer

Hi Team,

When I did below search, I am getting the count of event details under "Null" column name. 

index=main|search query|timechart span=5m count by events 

Result:

_time                     Null

06/10/2021.        200

But instead of column name as null, I need some other alias name.How to do that?

0 Karma

danielcj
Communicator

Hi,

Is this Null value expected? It seems that the "events" field is not find in your search results and because of this it is returning the results as Null.

If this value is expected and you want to rename the Null column you could append the following to your search.

 

| rename Null as <field_alias>

 

0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

  Ready to master Kubernetes and cloud monitoring like the pros?Join Splunk’s Growth Engineering team for an ...

Wrapping Up Cybersecurity Awareness Month

October might be wrapping up, but for Splunk Education, cybersecurity awareness never goes out of season. ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

&#x1f5e3; You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...