Splunk Search

How to use timechart with Eval command

shugup2923
Path Finder

index=storage source="/******.csv"
| stats sum(00_
) //It represents sum of various fields
| eval sum1=0
| foreach sum*
[ eval sum1=sum1+'<>']
| addinfo
| eval time_in_min=(info_max_time-info_min_time)/60
| eval sum1=sum1/time_in_min //It shows the average value
| fields sum1

I need timechart for sum1 with above data, is it possible ? Any help would be appreciated.
Thanks in Advance

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The problem lies with the stats and fields commands. They stripped out the _time field required by timechart. Use streamstats in place of stats or find a way to include _time in stats. Change fields sum1 to fields _time sum1.

---
If this reply helps you, Karma would be appreciated.

kamlesh_vaghela
SplunkTrust
SplunkTrust

@shugup2923

Can you please share your search using code block?

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...

Observability Simplified: Combining User Experience, Application Performance & ...

Tech Talk Observability Simplified: Combining User Experience, Application Performance & Network ...

Event Series May & June: From Network Visibility to Service Intelligence

Unifying the Network: Moving from Alert Noise to Service Intelligence with Splunk ITSI In today’s hybrid ...