Splunk Search

timechart with SLA value

hartfoml
Motivator

I would like to create a timechart with an SLA value.

I have tried this search sourcetype=foo | eval sla=50 | timechart span=15m count | table count sla

this did not work reliably.

Can anyone suggest a better way

0 Karma
1 Solution

jonuwz
Influencer

This is probably what you need :

search sourcetype=foo | timechart span=15m count | eval sla=50

View solution in original post

jonuwz
Influencer

This is probably what you need :

search sourcetype=foo | timechart span=15m count | eval sla=50

MuS
SplunkTrust
SplunkTrust

found one way to be able to drill down with sla line, use the eval before the timechart like this:

… | eval b=50 | timechart values(b) as base count by foo

MuS
SplunkTrust
SplunkTrust

Hi, using this eval after timechart works perfect. But if you create a report view out of it, you are no longer able to drill down -> PARSER: Applying intentions failed Unable to drilldown because of post-reporting 'eval' command

How can this be avoid?

0 Karma

hartfoml
Motivator

Thanks Jonuwx

0 Karma
Get Updates on the Splunk Community!

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...

From GPU to Application: Monitoring Cisco AI Infrastructure with Splunk Observability ...

AI workloads are different. They demand specialized infrastructure—powerful GPUs, enterprise-grade networking, ...

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...