Splunk Search

How to use timechart with Eval command

shugup2923
Path Finder

index=storage source="/******.csv"
| stats sum(00_
) //It represents sum of various fields
| eval sum1=0
| foreach sum*
[ eval sum1=sum1+'<>']
| addinfo
| eval time_in_min=(info_max_time-info_min_time)/60
| eval sum1=sum1/time_in_min //It shows the average value
| fields sum1

I need timechart for sum1 with above data, is it possible ? Any help would be appreciated.
Thanks in Advance

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The problem lies with the stats and fields commands. They stripped out the _time field required by timechart. Use streamstats in place of stats or find a way to include _time in stats. Change fields sum1 to fields _time sum1.

---
If this reply helps you, Karma would be appreciated.

kamlesh_vaghela
SplunkTrust
SplunkTrust

@shugup2923

Can you please share your search using code block?

0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...