Splunk Search

Timechart with overall count

yAlff
Path Finder

Hello Answers-Base,

I have a timechart where i see the statistics over some softwareversions --> see example

searchstring | timechart dc(id) by boxsw | rename _time AS Zeit | convert timeformat="%d.%m.%Y" ctime(Zeit)

Now I see a diagramm with the softwareversions in the field, ordnered by time - so far, so good. But I need one more line, that shows how much results were there over time, means all results added.

I just tried something like timechart dc(id) by boxsw, count by id, but Mr Splunk tells me, that the argument count is invalid. Btw I use (and have to use) Splunk 5.0.2.

Do you have a solution?

Thanks and greeting from Germany

Update according to the answer from kristian.kolb:
I think I did not outline my idea clearly.

The table should look like:
Zeit boxsw1 boxsw2 allsw
30.10.2013 2 5 7
31.10.2013 7 20 27

Tags (2)
0 Karma
1 Solution

kristian_kolb
Ultra Champion

...| addcoltotals labelfield=Zeit label=Total

might be what you're looking for, which would add an extra line like so;

Zeit         boxsw1  boxsw2  boxsw3
30.11.2013       33      12       9
31.11.2013       10      12      21
Total            43      24      30

UPDATE:

addtotals is what you're looking for

http://docs.splunk.com/Documentation/Splunk/6.0/SearchReference/addtotals

/K

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

In general, you could run two searches over the same time range with the same bucket span and join them together over _time. For your example from above

... | timechart dc(id) by boxsw, count by id

it could look like this:

... | timechart dc(id) by boxsw | join _time [search ... | timechart count by id]

You'd get one row per bucket with the columns from both searches.

kristian_kolb
Ultra Champion

...| addcoltotals labelfield=Zeit label=Total

might be what you're looking for, which would add an extra line like so;

Zeit         boxsw1  boxsw2  boxsw3
30.11.2013       33      12       9
31.11.2013       10      12      21
Total            43      24      30

UPDATE:

addtotals is what you're looking for

http://docs.splunk.com/Documentation/Splunk/6.0/SearchReference/addtotals

/K

yAlff
Path Finder

Thank you, that's what I was looking for!

0 Karma

kristian_kolb
Ultra Champion

see update above

0 Karma

yAlff
Path Finder

Thank you for this answer, but that's actually not what I need. I updated my question.

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...