Splunk Search

How to use timechart with Eval command

shugup2923
Path Finder

index=storage source="/******.csv"
| stats sum(00_
) //It represents sum of various fields
| eval sum1=0
| foreach sum*
[ eval sum1=sum1+'<>']
| addinfo
| eval time_in_min=(info_max_time-info_min_time)/60
| eval sum1=sum1/time_in_min //It shows the average value
| fields sum1

I need timechart for sum1 with above data, is it possible ? Any help would be appreciated.
Thanks in Advance

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The problem lies with the stats and fields commands. They stripped out the _time field required by timechart. Use streamstats in place of stats or find a way to include _time in stats. Change fields sum1 to fields _time sum1.

---
If this reply helps you, Karma would be appreciated.

kamlesh_vaghela
SplunkTrust
SplunkTrust

@shugup2923

Can you please share your search using code block?

0 Karma
Get Updates on the Splunk Community!

Security Professional: Sharpen Your Defenses with These .conf25 Sessions

Sooooooooooo, guess what. .conf25 is almost here, and if you're on the Security Learning Path, this is your ...

First Steps with Splunk SOAR

Our first step was to gather a list of the playbooks we wanted and to sort them by priority.  Once this list ...

How To Build a Self-Service Observability Practice with Splunk Observability Cloud

If you’ve read our previous post on self-service observability, you already know what it is and why it ...