Splunk Search

Multiple values - mvexpand not doing what I expect

dbcase
Motivator

Hi ,

I have a query that looks like this

earliest=-100hr index=blahalarm STATUS=readyArmed OR STATUS=ready OR STATUS=notReady|mvexpand notReady|mvexpand ready|mvexpand readyArmed|mvexpand _time|timechart span=1hr values(field2) by STATUS

but the resulting dataset comes back as this. I'm confused, why wouldn't mvexpand create multiple events?

alt text

0 Karma
1 Solution

dbcase
Motivator

FIxed it. My data was coming in with 15min increments but my span=1hr, once I set my span to 15min all is well

View solution in original post

0 Karma

dbcase
Motivator

FIxed it. My data was coming in with 15min increments but my span=1hr, once I set my span to 15min all is well

0 Karma

elliotproebstel
Champion

Doesn't the final timechart span=1h bring the events back into 1h buckets? The result looks like what I'd expect. Can you say more about what you're trying to achieve?

0 Karma
Get Updates on the Splunk Community!

Fueling your curiosity with new Splunk ILT and eLearning courses

At Splunk Education, we’re driven by curiosity—both ours and yours! That’s why we’re committed to delivering ...

Splunk AI Assistant for SPL 1.1.0 | Now Personalized to Your Environment for Greater ...

Splunk AI Assistant for SPL has transformed how users interact with Splunk, making it easier than ever to ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureOn Demand Now Step boldly into the AI revolution with enhanced security ...