Splunk Search

chart values from search

sreynolds30
Explorer

I have a search that returns time as this:

Apr 25 2014 14:51:40 GMT: INFO (nsup): (base/thr_nsup.c:1249) {ddp-ns} Records: 17798730, 17798730 0-vt, 0(0) expired, 0(0) evicted, 0(0) set deletes, 0(0) set evicted. Evict ttls: 0,0,0.000. Waits: 0,0,0. Total time: 3169 ms

I would like to chart this total time over time but not having luck. thanks.

Tags (1)
0 Karma

sreynolds30
Explorer

I got it going thanks.

0 Karma

somesoni2
Revered Legend

If possible, add the answer that you arrived to here and accept/close the answer.

0 Karma

somesoni2
Revered Legend

This one event that you're indexing in splunk or output of a search? You could extract Total time in a field and do a timechart.

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security(ES) 7.3 is approaching the end of support. Get ready for ...

Hi friends!    At Splunk, your product success is our top priority. With Enterprise Security (ES), we're here ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...