Splunk Search

Is there a way to group by multiple fields in a timechart?

daniel333
Builder

All,

I am looking to create a single timechart which displays the count of status by requestcommand by action. So two "by's". Maybe I should compound the field?

tag=myrest "https://api.mydomain.net/somemethod/listings/*" host=MYHOST*
| rex field=_raw "action=(?<requestcommand>RELEASE|HOLD|EXTEND|PURCHASE)"
| rename event.Properties.LogEntry.ResponseStatusCode AS status
| search status=*
| timechart count(status) by action, requestcommand
0 Karma

mayurr98
Super Champion

Try this :

tag=myrest "https://api.mydomain.net/somemethod/listings/*" host=MYHOST* 
| bin _time span=5m \\specify time span 
| rex field=_raw "action=(?<requestcommand>RELEASE|HOLD|EXTEND|PURCHASE)" 
| rename event.Properties.LogEntry.ResponseStatusCode AS status 
| search status=* 
| stats count(status) as status_count by _time action requestcommand

Let me know if this helps!

0 Karma

somesoni2
Revered Legend

Yes.. combine the field before your timechart command.

...| eval action_rcommand=action.":".requestcommand
| timechart count(status) by action_rcommand
Get Updates on the Splunk Community!

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

New Release | Splunk Cloud Platform 10.1.2507

Hello Splunk Community!We are thrilled to announce the General Availability of Splunk Cloud Platform 10.1.2507 ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

&#x1f5e3; You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...