Splunk Search

Doing calculations using eval command with fields generated by timechart command.

jvmerilla
Path Finder

Hi,

I'm doing some search query where I used timechart command that creates fields. Now, what I want to do is to some calculations with this fields using eval command but nothing happens.

Here's my query:

index="sample_data" sourcetype="management_sampledata.csv" 
| timechart count(Ticket_No) as Inflow
| append 
    [search index="sample_data" sourcetype="management_sampledata.csv" Status=Closed 
    | timechart count(Ticket_No) as Closed/Cancelled 
    | fillnull]
| timechart first(*) as *
| eval Backlog_Total = (Inflow-Closed/Cancelled)

And here's the result:
alt text

What I was expecting to happen is a new field named "Backlog_Total" will be created using the eval command.

I hope someone can help me with this.

Thank you.

Tags (3)
0 Karma
1 Solution

kamlesh_vaghela
SplunkTrust
SplunkTrust

Hi

Can you please try this?

index="sample_data" sourcetype="management_sampledata.csv" 
 | timechart count(Ticket_No) as Inflow
 | append 
     [search index="sample_data" sourcetype="management_sampledata.csv" Status=Closed 
     | timechart count(Ticket_No) as "Closed/Cancelled"
     | fillnull]
 | timechart first(*) as *
 | eval Backlog_Total = (Inflow-'Closed/Cancelled')

I have just changed in Closed/Cancelled field.

Thanks

View solution in original post

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

Hi

Can you please try this?

index="sample_data" sourcetype="management_sampledata.csv" 
 | timechart count(Ticket_No) as Inflow
 | append 
     [search index="sample_data" sourcetype="management_sampledata.csv" Status=Closed 
     | timechart count(Ticket_No) as "Closed/Cancelled"
     | fillnull]
 | timechart first(*) as *
 | eval Backlog_Total = (Inflow-'Closed/Cancelled')

I have just changed in Closed/Cancelled field.

Thanks

0 Karma

jvmerilla
Path Finder

Hi @kamlesh_vaghela,

It works!

Thank you again. 🙂

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

Glad to help you.
Can you please accept the answer to close this question and upvote any comment which helps you.

Happy Splunking

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...