Splunk Search

column chart : How can we create a chart with three fields?

LauraBre
Communicator

Hello,

I have a question about a timechart creation. I want to create a columns chart. My search is :

tag::source="TokenizerWatchdogSplunk"| Service_Type="*" | eval series=case(Service_Type="T2D", "detok", Service_Type="D2T", "tok") |chart count(Service_Type) by series, _time, Requester

series and Requester are two fields that I created. I want to have time and requester in abscissa and the number of Service_type by series in ordinate. I want to have the number of detok and tok by requester. A requester is a column and this on basis on the time. But I don't able to have a chart of this type. How can I resolve this?

Thanks in advance.

Tags (2)
0 Karma
1 Solution

brettcave
Builder

Is this close to what you are looking for?
chart count(Service_Type) by series over Requester

View solution in original post

brettcave
Builder

Is this close to what you are looking for?
chart count(Service_Type) by series over Requester

AlexMcDuffMille
Communicator

This will only show values that have counts. Using the fields command we can show the count of other series that may have existed, but how do we fill those null values with 0 if they have no events? The fillnull command does not seem to work in that case.

0 Karma

john
Communicator

hi,

can we create a chart on difference of two coulmn.And on right it should show the two column values too is it possible.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...