Splunk Search

Timechart of values

tbrown
Path Finder

This is probably a really simple question but I have events coming in every minute.

I've used  | rex field=_raw .... to extract a field from those events.

How do I plot these field values over time?

tbrown_0-1596819512301.png

This is what my statistics look like. 

I've tried 

| timechart span=1m values(Last_Heartbeats)

but nothing shows up on my line graph. I've also tried it without a span, I've tried | stats with a | bucket command, I've tried dc(Last_Heartbeats) but I can't figure it out.

Labels (5)
0 Karma

bowesmana
SplunkTrust
SplunkTrust

See that your numbers in that column are left justified - that's always a good indicator that Splunk does not think they are numbers, so @isoutamo 's reply is likely to fix your problem

isoutamo
SplunkTrust
SplunkTrust

Are you sure that those Last_Heartbeats are numbers? If not then use

eval Last_Heartbeats = tonumber (trim(Last_Heartbeats))

r. Ismo

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...