Splunk Search

count how many records was opened by open date field

matansocher
Contributor

Hi,

I have a table of incidents and I want to count the number of incidents opened per month.
Each record updates after the status of an incident is change. for example, incident is closed so the old record updated the status field to close.
table:
alt text

After an update, the only thing I have left to know about the opening of the incident is the creation date field (sys_created_on).

Is there any way I can count the number of incidents opened for every month in timechart?

Thanks

0 Karma
1 Solution

rjthibod
Champion

You can convert sys_created_on to a timestamp using | eval timestamp = strptime(sys_created_on, "%m/%d/%Y"), so then you can make a timechart after that.

<YOUR BASE SEARCH> | eval timestamp = strptime(sys_created_on, "%m/%d/%Y") | rename timestamp as _time | timechart span=1mon count as Opened

View solution in original post

rmarcum
Explorer

If this is from the Splunk ServiceNow App, the _time is most likely coming in as LOCAL, and sys_created_on as GMT. On your dashboard you most likely want your time chart to also be LOCAL time. Accordingly, I would recommend:

 | rename COMMENT AS "equate _time TO sys_created_on_Local which can be converted FROM sys_created_on_GMT "
 | eval _time=strptime((sys_created_on_GMT." UTC"),"%Y-%m-%d %T %Z")
 | timechart count ... etc.
0 Karma

rjthibod
Champion

You can convert sys_created_on to a timestamp using | eval timestamp = strptime(sys_created_on, "%m/%d/%Y"), so then you can make a timechart after that.

<YOUR BASE SEARCH> | eval timestamp = strptime(sys_created_on, "%m/%d/%Y") | rename timestamp as _time | timechart span=1mon count as Opened

Get Updates on the Splunk Community!

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer at Splunk .conf24 ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...

Share Your Ideas & Meet the Lantern team at .Conf! Plus All of This Month’s New ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...

Combine Multiline Logs into a Single Event with SOCK: a Step-by-Step Guide for ...

Combine multiline logs into a single event with SOCK - a step-by-step guide for newbies Olga Malita The ...