Splunk Search

Help charting the total count on line chart?

tfitzgerald15
Explorer

Hey guys. So I need to display a dashboard panel with a single line, the total count of all hits from the Palo Altos that are either High or Critical. First, I pull out the criteria.

sourcetype="pan_threat" (severity="high" OR "critical")

Now, when I timechart that (timechart count by dst_ip), it throws a few lines at me. So far so good. However, when I do the following:

sourcetype="pan_threat" (severity="high" OR "critical") | timechart sum(count) by dst_ip

It throws me back 0 results. Using eval fails in an even more spectacular way.

sourcetype="pan_threat" (severity="high" OR "critical") | eval total=sum(count) | timechart total by dst_ip

Error in 'eval' command: The 'sum' function is unsupported or undefined.

I'll fully admit I'm confused. Logically, all I want it to do is add count per hour, and plot that number on the graph, moving onto the next one. If I can type it in one sentence here, it shouldn't be that hard to do. What am I missing?

0 Karma

lguinn2
Legend

Why not this?

sourcetype="pan_threat" (severity="high" OR "critical") | timechart span=1h count
0 Karma

tfitzgerald15
Explorer

I would have thought that would have just forced it to make them plot every hour instead of every day, giving harsher peaks and valleys to the 10 lines already on there.

Seems to have worked though!

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...