Splunk Search

Timechart of values

tbrown
Path Finder

This is probably a really simple question but I have events coming in every minute.

I've used  | rex field=_raw .... to extract a field from those events.

How do I plot these field values over time?

tbrown_0-1596819512301.png

This is what my statistics look like. 

I've tried 

| timechart span=1m values(Last_Heartbeats)

but nothing shows up on my line graph. I've also tried it without a span, I've tried | stats with a | bucket command, I've tried dc(Last_Heartbeats) but I can't figure it out.

Labels (5)
0 Karma

bowesmana
SplunkTrust
SplunkTrust

See that your numbers in that column are left justified - that's always a good indicator that Splunk does not think they are numbers, so @isoutamo 's reply is likely to fix your problem

isoutamo
SplunkTrust
SplunkTrust

Are you sure that those Last_Heartbeats are numbers? If not then use

eval Last_Heartbeats = tonumber (trim(Last_Heartbeats))

r. Ismo

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...