Splunk Search

Help charting the total count on line chart?

tfitzgerald15
Explorer

Hey guys. So I need to display a dashboard panel with a single line, the total count of all hits from the Palo Altos that are either High or Critical. First, I pull out the criteria.

sourcetype="pan_threat" (severity="high" OR "critical")

Now, when I timechart that (timechart count by dst_ip), it throws a few lines at me. So far so good. However, when I do the following:

sourcetype="pan_threat" (severity="high" OR "critical") | timechart sum(count) by dst_ip

It throws me back 0 results. Using eval fails in an even more spectacular way.

sourcetype="pan_threat" (severity="high" OR "critical") | eval total=sum(count) | timechart total by dst_ip

Error in 'eval' command: The 'sum' function is unsupported or undefined.

I'll fully admit I'm confused. Logically, all I want it to do is add count per hour, and plot that number on the graph, moving onto the next one. If I can type it in one sentence here, it shouldn't be that hard to do. What am I missing?

0 Karma

lguinn2
Legend

Why not this?

sourcetype="pan_threat" (severity="high" OR "critical") | timechart span=1h count
0 Karma

tfitzgerald15
Explorer

I would have thought that would have just forced it to make them plot every hour instead of every day, giving harsher peaks and valleys to the 10 lines already on there.

Seems to have worked though!

0 Karma
Get Updates on the Splunk Community!

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...