Splunk Enterprise

Timechart Count by multiple regexed fields

New Member

I'm trying to create a timechart that tracks the total count of 3 different areas of error per day. I've regexed out each type which works fine, but I cannot get a timechart to work at all.

This is my current splunk search:

host="hostname" sourcetype=sourcetypename "[ERROR]" | rex field=_raw "\.php\:\d+\n(?P<StackTraceError>.*)\:\n" | rex field=_raw "\\\LdapServiceProvider\:\:(?P<IncorrectUsernameOrPassword>.+)\s" | rex field=_raw "\s\-\sTraceyId\:\"(?P<AppError>.+)\-\d.+\"\s\-\-"

Any ideas?

Tags (1)
0 Karma


Try this...

 host="hostname" sourcetype=sourcetypename "[ERROR]" 
| rex field=_raw "\.php\:\d+\n(?P<StackTraceError>.*)\:\n" 
| rex field=_raw "\\\LdapServiceProvider\:\:(?P<IncorrectUsernameOrPassword>.+)\s" 
| rex field=_raw "\s\-\sTraceyId\:\"(?P<AppError>.+)\-\d.+\"\s\-\-"
| bin _time span=1m
| stats count(StackTraceError) as StackTraceError count(IncorrectUsernameOrPassword) as IncorrectUsernameOrPassword count(AppError) as AppError by _time
| untable _time errortype errorcount
| timechart sum(errorcount) as errorcount by errortype 
0 Karma


What is the issue you are facing with timechart? What is the timechart query you are running?

Are you able to display values in table using

 | head 10 
 | table _time StackTraceError IncorrectUserNameOrPassword AppError
| makeresults | eval message= "Happy Splunking!!!"
0 Karma
Get Updates on the Splunk Community!

Build Scalable Security While Moving to Cloud - Guide From Clayton Homes

 Clayton Homes faced the increased challenge of strengthening their security posture as they went through ...

Mission Control | Explore the latest release of Splunk Mission Control (2.3)

We’re happy to announce the release of Mission Control 2.3 which includes several new and exciting features ...

Cloud Platform | Migrating your Splunk Cloud deployment to Python 3.7

Python 2.7, the last release of Python 2, reached End of Life back on January 1, 2020. As part of our larger ...