Hi,
I have a table of incidents and I want to count the number of incidents opened per month.
Each record updates after the status of an incident is change. for example, incident is closed so the old record updated the status field to close.
table:
After an update, the only thing I have left to know about the opening of the incident is the creation date field (sys_created_on).
Is there any way I can count the number of incidents opened for every month in timechart?
Thanks
You can convert sys_created_on
to a timestamp using | eval timestamp = strptime(sys_created_on, "%m/%d/%Y")
, so then you can make a timechart after that.
<YOUR BASE SEARCH> | eval timestamp = strptime(sys_created_on, "%m/%d/%Y") | rename timestamp as _time | timechart span=1mon count as Opened
If this is from the Splunk ServiceNow App, the _time is most likely coming in as LOCAL, and sys_created_on as GMT. On your dashboard you most likely want your time chart to also be LOCAL time. Accordingly, I would recommend:
| rename COMMENT AS "equate _time TO sys_created_on_Local which can be converted FROM sys_created_on_GMT "
| eval _time=strptime((sys_created_on_GMT." UTC"),"%Y-%m-%d %T %Z")
| timechart count ... etc.
You can convert sys_created_on
to a timestamp using | eval timestamp = strptime(sys_created_on, "%m/%d/%Y")
, so then you can make a timechart after that.
<YOUR BASE SEARCH> | eval timestamp = strptime(sys_created_on, "%m/%d/%Y") | rename timestamp as _time | timechart span=1mon count as Opened