Splunk Search

timechart with SLA value

hartfoml
Motivator

I would like to create a timechart with an SLA value.

I have tried this search sourcetype=foo | eval sla=50 | timechart span=15m count | table count sla

this did not work reliably.

Can anyone suggest a better way

0 Karma
1 Solution

jonuwz
Influencer

This is probably what you need :

search sourcetype=foo | timechart span=15m count | eval sla=50

View solution in original post

jonuwz
Influencer

This is probably what you need :

search sourcetype=foo | timechart span=15m count | eval sla=50

MuS
SplunkTrust
SplunkTrust

found one way to be able to drill down with sla line, use the eval before the timechart like this:

… | eval b=50 | timechart values(b) as base count by foo

MuS
SplunkTrust
SplunkTrust

Hi, using this eval after timechart works perfect. But if you create a report view out of it, you are no longer able to drill down -> PARSER: Applying intentions failed Unable to drilldown because of post-reporting 'eval' command

How can this be avoid?

0 Karma

hartfoml
Motivator

Thanks Jonuwx

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...