Splunk Search

a very simple query with two data

rpachecoa
New Member

hello Guys,

I'm very very noob using Splunk, I have a very simple log file  which contains 5 columns of data:

bloque1 | 2020-04-01| 05:39:35.407 | 09:14:34.398 | 03:34:58.991
bloque1 | 2020-04-02| 03:50:29.469 | 07:26:32.869 | 03:36:03.4
bloque1 | 2020-04-03| 04:09:47.659 | 08:05:38.248 | 03:55:50.589
bloque1 | 2020-04-04| 04:49:51.142 | 08:37:40.141 | 03:47:48.999
bloque1 | 2020-04-05| 05:27:43.616 | 09:06:23.898 | 03:38:40.282
bloque1 | 2020-04-06| 06:51:08.264 | 10:27:12.113 | 03:36:03.849
bloque1 | 2020-04-07| 04:05:32.292 | 07:54:32.055 | 03:48:59.763

etc, I am trying to graph the second field with the last field.

The second field is the day of execution of a process and the last field is the average execution time  of that process.  I just want a graph that places the value of the execution date on "x" axis and the average time per day on the "y" Axis. 

But I only get a straight line graph with the event count per day. 

Could you help me with the query or the necessary steps to be able to obtain the graph I want. I greatly appreciate the support and your comments.

 

0 Karma

Nisha18789
Builder

Hi @rpachecoa , assuming execution date field name as execution_date and avg execution time as avg_exec_time and process name as process

......| chart values(avg_exec_time) by process over execution_date 

please upvote if it helps!

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...