Splunk Search

chart values from search

sreynolds30
Explorer

I have a search that returns time as this:

Apr 25 2014 14:51:40 GMT: INFO (nsup): (base/thr_nsup.c:1249) {ddp-ns} Records: 17798730, 17798730 0-vt, 0(0) expired, 0(0) evicted, 0(0) set deletes, 0(0) set evicted. Evict ttls: 0,0,0.000. Waits: 0,0,0. Total time: 3169 ms

I would like to chart this total time over time but not having luck. thanks.

Tags (1)
0 Karma

sreynolds30
Explorer

I got it going thanks.

0 Karma

somesoni2
Revered Legend

If possible, add the answer that you arrived to here and accept/close the answer.

0 Karma

somesoni2
Revered Legend

This one event that you're indexing in splunk or output of a search? You could extract Total time in a field and do a timechart.

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...