Splunk Search

Timechart Table Question

jhayIV
Engager

Is there a way to add a column to the table below that divides each value by the IS&O to value to get a column that shows compliance?

Example for Tuesday I would like to have a column that divides System Role by IS&O Servers 10046/11683, 86%

Also is there a way to remove the _span entries at the bottom?
alt text

Tags (2)
0 Karma
1 Solution

cmerriman
Super Champion

as long as you're only looking at a 7 day time window, try this:

| timechart span=1d dc(Name) as "IS&O Servers" , Count(SystemRole) as "System Role", count(IsVirtual) as "Virtual Flag", count(OS) as "OS Relationships",count(Site) as "Location",count(Serial_Number) as "Serial Number",count(Domain) as "Domain",count(NumberOfProcessors) as "Processors",count(Total_Physical_Memory) as "Memory"| eval _time=strftime(_time, "%A")|fields - _span*|foreach * [eval <<MATCHSTR>>_perc='<<FIELD>>'/'IS&O Servers']|fields - "IS&O Servers_perc"| transpose header_field=_time

View solution in original post

0 Karma

cmerriman
Super Champion

as long as you're only looking at a 7 day time window, try this:

| timechart span=1d dc(Name) as "IS&O Servers" , Count(SystemRole) as "System Role", count(IsVirtual) as "Virtual Flag", count(OS) as "OS Relationships",count(Site) as "Location",count(Serial_Number) as "Serial Number",count(Domain) as "Domain",count(NumberOfProcessors) as "Processors",count(Total_Physical_Memory) as "Memory"| eval _time=strftime(_time, "%A")|fields - _span*|foreach * [eval <<MATCHSTR>>_perc='<<FIELD>>'/'IS&O Servers']|fields - "IS&O Servers_perc"| transpose header_field=_time
0 Karma

jhayIV
Engager

That is perfect, is there a way to do it as a column for each date? This appended the perc's to the bottom of the table.

0 Karma

cmerriman
Super Champion

This took a bit of thought but I think it should work.

| timechart span=1d dc(Name) as "IS&O Servers" , Count(SystemRole) as "System Role", count(IsVirtual) as "Virtual Flag", count(OS) as "OS Relationships",count(Site) as "Location",count(Serial_Number) as "Serial Number",count(Domain) as "Domain",count(NumberOfProcessors) as "Processors",count(Total_Physical_Memory) as "Memory"| eval _time=strftime(_time, "%A")|fields - _span*|foreach * [eval <<MATCHSTR>>_perc='<<FIELD>>'/'IS&O Servers']|fields - "IS&O Servers_perc"|appendpipe [stats values(*_perc) as * by _time]|eval _time=if(isnull('IS&O Servers'),_time+"_perc",_time)|fields - *_perc| transpose 14 header_field=_time
0 Karma

jhayIV
Engager

Impressive, thanks man!

0 Karma

aaraneta_splunk
Splunk Employee
Splunk Employee

@jhayIV - If cmerriman helped to answer your question, please accept her answer and up-vote any helpful comments from her. Thanks!

0 Karma

jhayIV
Engager

It didnt allow me to post an image here is the code I was using

| timechart span=1d dc(Name) as "IS&O Servers" , Count(SystemRole) as "System Role", count(IsVirtual) as "Virtual Flag", count(OS) as "OS Relationships",count(Site) as "Location",count(Serial_Number) as "Serial Number",count(Domain) as "Domain",count(NumberOfProcessors) as "Processors",count(Total_Physical_Memory) as "Memory"| eval _time=strftime(_time, "%A")| transpose

0 Karma

cmerriman
Super Champion

are you doing just a 7 day span for your search? I'm just thinking if you do 2 weeks, it isn't going to combine your Thursdays together in the transpose.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...