Splunk Search

How to use timechart command across time ranges

sudeep5689
Explorer

I have a query in splunk
index = * STATUS_CODE earliest=-2mon@mon latest=-1mon@mon | fields STATUS_CODE | rex field=_raw "STATUS_CODE:(?.{0,1}\d)"
| eval success=if(status_code in(0,1),1,0) | timechart count as total sum(success) as success
| eval success_rate=round((success/total)*100,3)
| eval success_rate=success_rate + "%" | table _time success_rate | append [search index = * STATUS_CODE earliest=-1mon@mon latest=@mon | fields STATUS_CODE | rex field=_raw "STATUS_CODE:(?.{0,1}\d)"
| eval success=if(status_code in(0,1),1,0) | timechart count as total sum(success) as success
| eval success_rate=round((success/total)*100,3)
| eval success_rate=success_rate + "%" | table _time success_rate]

I want to show the single value visualization displaying the increase/decrease in success_rate, but its not displaying correctly. I mean i need to add a timechart command again but thats not working. Can anyone help

Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please explain what is meant by "its not displaying correctly". What are you getting? What are you expecting?
Have you tried removing eval success_rate=success_rate + "%" so Splunk is only displaying numbers?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Devesh Logendran, Splunk, and the Singapore Cyber Conquest

At this year’s Splunk University, I had the privilege of chatting with Devesh Logendran, one of the winners in ...

There's No Place Like Chrome and the Splunk Platform

WATCH NOW!Malware. Risky Extensions. Data Exfiltration. End-users are increasingly reliant on browsers to ...

Customer Experience | Join the Customer Advisory Board!

Are you ready to take your Splunk journey to the next level? 🚀 We invite you to join our elite squad ...