Splunk Search

chart values from search

sreynolds30
Explorer

I have a search that returns time as this:

Apr 25 2014 14:51:40 GMT: INFO (nsup): (base/thr_nsup.c:1249) {ddp-ns} Records: 17798730, 17798730 0-vt, 0(0) expired, 0(0) evicted, 0(0) set deletes, 0(0) set evicted. Evict ttls: 0,0,0.000. Waits: 0,0,0. Total time: 3169 ms

I would like to chart this total time over time but not having luck. thanks.

Tags (1)
0 Karma

sreynolds30
Explorer

I got it going thanks.

0 Karma

somesoni2
Revered Legend

If possible, add the answer that you arrived to here and accept/close the answer.

0 Karma

somesoni2
Revered Legend

This one event that you're indexing in splunk or output of a search? You could extract Total time in a field and do a timechart.

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...