Splunk Search

How to use timechart command across time ranges

sudeep5689
Explorer

I have a query in splunk
index = * STATUS_CODE earliest=-2mon@mon latest=-1mon@mon | fields STATUS_CODE | rex field=_raw "STATUS_CODE:(?.{0,1}\d)"
| eval success=if(status_code in(0,1),1,0) | timechart count as total sum(success) as success
| eval success_rate=round((success/total)*100,3)
| eval success_rate=success_rate + "%" | table _time success_rate | append [search index = * STATUS_CODE earliest=-1mon@mon latest=@mon | fields STATUS_CODE | rex field=_raw "STATUS_CODE:(?.{0,1}\d)"
| eval success=if(status_code in(0,1),1,0) | timechart count as total sum(success) as success
| eval success_rate=round((success/total)*100,3)
| eval success_rate=success_rate + "%" | table _time success_rate]

I want to show the single value visualization displaying the increase/decrease in success_rate, but its not displaying correctly. I mean i need to add a timechart command again but thats not working. Can anyone help

Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please explain what is meant by "its not displaying correctly". What are you getting? What are you expecting?
Have you tried removing eval success_rate=success_rate + "%" so Splunk is only displaying numbers?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...