Splunk Search

Timechart add value that doesn't appear in log

gnoellbn
Explorer

Hello,

I'm trying to add a value to my timechart which doesn't appear in my log.

That search gives me my graph but I would like to add a field "MaxQuota" equals to 5

index=_internal source="/opt/splunk/var/log/splunk/license_audit.log" | timechart values(quotaExceededCount) |

Does anyone now how to do this ?

Thanks

Tags (1)
0 Karma
1 Solution

gfuente
Motivator

Hello

Just try this:

index=_internal source="/opt/splunk/var/log/splunk/license_audit.log" | eval MaxQuota="5" | timechart values(quotaExceededCount), last(MaxQuota)

This will give you a horizontal line in the chart as well as your previous data.

regards

View solution in original post

gfuente
Motivator

Hello

Just try this:

index=_internal source="/opt/splunk/var/log/splunk/license_audit.log" | eval MaxQuota="5" | timechart values(quotaExceededCount), last(MaxQuota)

This will give you a horizontal line in the chart as well as your previous data.

regards

gfuente
Motivator

Easy one 🙂

0 Karma

gnoellbn
Explorer

that's simple enough, I though "eval" would only take actual fields
thanks a lot 🙂

0 Karma
Get Updates on the Splunk Community!

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...

UCC Framework: Discover Developer Toolkit for Building Technology Add-ons

The Next-Gen Toolkit for Splunk Technology Add-on Development The Universal Configuration Console (UCC) ...

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...