Splunk Search

timeseries using an OR text search

chadwell
Explorer

So I have the following search and I want to create a dashboard with separate columns for "Hits" and "Misses".

Seems this should be pretty straightforward but I am lost joins, stats, evals etc:

cf_org_name="ABB" cf_space_name="qa" cf_app_name=*qa-my-app* index=ocf_* "CACHE Hit" OR "CACHE Miss" | timechart span=1d count by type

How can I convert this to a chart with 2 columns which show Hits and Misses per day?

Thanks

Labels (4)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Set the type field based on which string was found in the event.

cf_org_name="ABB" cf_space_name="qa" cf_app_name=*qa-my-app* index=ocf_* "CACHE Hit" OR "CACHE Miss" 
| eval type=if(searchmatch("CACHE Hit"),"Hit","Miss")
| timechart span=1d count by type
---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Set the type field based on which string was found in the event.

cf_org_name="ABB" cf_space_name="qa" cf_app_name=*qa-my-app* index=ocf_* "CACHE Hit" OR "CACHE Miss" 
| eval type=if(searchmatch("CACHE Hit"),"Hit","Miss")
| timechart span=1d count by type
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Community Content Calendar, November Edition

Welcome to the November edition of our Community Spotlight! Each month, we dive into the Splunk Community to ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...