Splunk Search

How to get chart of error events, treating multiple errors within milliseconds of each other as a single occurrence?

jlamb3
New Member

I have a query showing all errors of interest. Excerpt of result:
alt text

When this error happens, we get 3-6 errors spit out within milliseconds of each other, so what I'd like to do is take this search result and get a nice chart of the number of events, grouping all events from the same failure windows together. All 3 shown in the image would be counted as one.

My line of inquiry has resulted in:
**query** | timechart count by (date_month AND date_mday AND date_hour AND date_minute)
but that is still resulting in a count of 3 for the events in my image. Suggestions?

0 Karma

somesoni2
Revered Legend

Try like this

**query** | timechart dc(date_second) as ErrorCount

Do you have different error messages and want to count different Error messages within same second separately. If yes, then try like this

**query** | eval err=date_second."#".Error_Field | timechart dc(err) as ErrorCount
0 Karma
Get Updates on the Splunk Community!

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...

Splunk Up Your Game: Why It's Time to Embrace Python 3.9+ and OpenSSL 3.0

Did you know that for Splunk Enterprise 9.4, Python 3.9 is the default interpreter? This shift is not just a ...