Splunk Search

How can I convert a naive timechart command to an efficient one?

ddrillic
Ultra Champion

The following works fine for me -

sourcetype=<sourcetype> index=<index> | timechart span=1d count 

How can I convert it to an efficient eventstats or tstats command?

0 Karma
1 Solution

somesoni2
Revered Legend

The tstats version will be like this

| tstats count WHERE index=<index> sourcetype=<sourcetype> by _time span=1d 

If you don't the visualization right, just add this as well to above search

above search | timechart span=1d sum(count) as count

View solution in original post

0 Karma

somesoni2
Revered Legend

The tstats version will be like this

| tstats count WHERE index=<index> sourcetype=<sourcetype> by _time span=1d 

If you don't the visualization right, just add this as well to above search

above search | timechart span=1d sum(count) as count
0 Karma

ddrillic
Ultra Champion

Gorgeous @somesoni2. You put a new picture! - I'm afraid to put mine - too scary ; -)

0 Karma
Get Updates on the Splunk Community!

Splunk App for Anomaly Detection End of Life Announcment

Q: What is happening to the Splunk App for Anomaly Detection?A: Splunk is officially announcing the ...

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...