Splunk Search

How to use timechart with Eval command

shugup2923
Path Finder

index=storage source="/******.csv"
| stats sum(00_
) //It represents sum of various fields
| eval sum1=0
| foreach sum*
[ eval sum1=sum1+'<>']
| addinfo
| eval time_in_min=(info_max_time-info_min_time)/60
| eval sum1=sum1/time_in_min //It shows the average value
| fields sum1

I need timechart for sum1 with above data, is it possible ? Any help would be appreciated.
Thanks in Advance

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The problem lies with the stats and fields commands. They stripped out the _time field required by timechart. Use streamstats in place of stats or find a way to include _time in stats. Change fields sum1 to fields _time sum1.

---
If this reply helps you, Karma would be appreciated.

kamlesh_vaghela
SplunkTrust
SplunkTrust

@shugup2923

Can you please share your search using code block?

0 Karma
Get Updates on the Splunk Community!

Community Content Calendar, August edition

In the dynamic world of cybersecurity, staying ahead means constantly solving new puzzles and optimizing your ...

Pro Tips for First-Time .conf Attendees: Advice from SplunkTrust

Heading to your first .Conf? You’re in for an unforgettable ride — learning, networking, swag collecting, ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Whether you're managing complex deployments or looking to future-proof your data infrastructure, this session ...