Splunk Search

Help charting the total count on line chart?

tfitzgerald15
Explorer

Hey guys. So I need to display a dashboard panel with a single line, the total count of all hits from the Palo Altos that are either High or Critical. First, I pull out the criteria.

sourcetype="pan_threat" (severity="high" OR "critical")

Now, when I timechart that (timechart count by dst_ip), it throws a few lines at me. So far so good. However, when I do the following:

sourcetype="pan_threat" (severity="high" OR "critical") | timechart sum(count) by dst_ip

It throws me back 0 results. Using eval fails in an even more spectacular way.

sourcetype="pan_threat" (severity="high" OR "critical") | eval total=sum(count) | timechart total by dst_ip

Error in 'eval' command: The 'sum' function is unsupported or undefined.

I'll fully admit I'm confused. Logically, all I want it to do is add count per hour, and plot that number on the graph, moving onto the next one. If I can type it in one sentence here, it shouldn't be that hard to do. What am I missing?

0 Karma

lguinn2
Legend

Why not this?

sourcetype="pan_threat" (severity="high" OR "critical") | timechart span=1h count
0 Karma

tfitzgerald15
Explorer

I would have thought that would have just forced it to make them plot every hour instead of every day, giving harsher peaks and valleys to the 10 lines already on there.

Seems to have worked though!

0 Karma
Get Updates on the Splunk Community!

Technical Workshop Series: Splunk Data Management and SPL2 | Register here!

Hey, Splunk Community! Ready to take your data management skills to the next level? Join us for a 3-part ...

Spotting Financial Fraud in the Haystack: A Guide to Behavioral Analytics with Splunk

In today's digital financial ecosystem, security teams face an unprecedented challenge. The sheer volume of ...

Solve Problems Faster with New, Smarter AI and Integrations in Splunk Observability

Solve Problems Faster with New, Smarter AI and Integrations in Splunk Observability As businesses scale ...