Splunk Enterprise

help on timechart

jip31
Motivator

hello

I need to do a timechart from a stats count 

this stats count is used to pre filter events (sante=OK)

index=toto sourcetype=tutu 
| stats count(hang) as hang, count(crash) as crash, count(web) as web by site 
| eval sante=if((hang>5) AND (crash>2) AND (webduration>=1), "OK","KO")   
| search sante=OK

 Now I wonder how to do to timechart these events?

Thanks

Tags (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Your stats command needs to include some sort of time element

index=toto sourcetype=tutu 
| bin _time span=1h
| stats count(hang) as hang, count(crash) as crash, count(web) as web by _time site 
| eval sante=if((hang>5) AND (crash>2) AND (webduration>=1), "OK","KO")   
| search sante=OK

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Your stats command needs to include some sort of time element

index=toto sourcetype=tutu 
| bin _time span=1h
| stats count(hang) as hang, count(crash) as crash, count(web) as web by _time site 
| eval sante=if((hang>5) AND (crash>2) AND (webduration>=1), "OK","KO")   
| search sante=OK
0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...