hello Guys, I'm very very noob using Splunk, I have a very simple log file which contains 5 columns of data: bloque1 | 2020-04-01| 05:39:35.407 | 09:14:34.398 | 03:34:58.991 bloque1 | 2020-04-02| 03:50:29.469 | 07:26:32.869 | 03:36:03.4 bloque1 | 2020-04-03| 04:09:47.659 | 08:05:38.248 | 03:55:50.589 bloque1 | 2020-04-04| 04:49:51.142 | 08:37:40.141 | 03:47:48.999 bloque1 | 2020-04-05| 05:27:43.616 | 09:06:23.898 | 03:38:40.282 bloque1 | 2020-04-06| 06:51:08.264 | 10:27:12.113 | 03:36:03.849 bloque1 | 2020-04-07| 04:05:32.292 | 07:54:32.055 | 03:48:59.763 etc, I am trying to graph the second field with the last field. The second field is the day of execution of a process and the last field is the average execution time of that process. I just want a graph that places the value of the execution date on "x" axis and the average time per day on the "y" Axis. But I only get a straight line graph with the event count per day. Could you help me with the query or the necessary steps to be able to obtain the graph I want. I greatly appreciate the support and your comments.
... View more