Splunk Search

changing column name

mileven
Explorer

host=server| eval size = len(_raw) | eval DSize = round(size/1024,2)| chart count(counter),sum(DSize) as "Daily indexed in KB" over source

Is the query I have. It creates 3 colums as I want but the count(counters) is the middle column header and I want to change that to "Number of events" The rest of the query works just fine.

Tags (1)
0 Karma

mileven
Explorer

host=server | eval size = len(_raw) | eval DSize = round(size/1024,2)| chart count(counter) as "number of events" , sum(DSize) as "Daily indexed in KB" over source

Had the rename in the wrong part of the query.

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...