Splunk Search

Table : line column

LauraBre
Communicator

Hello,
I created a search where I want to create a table including several cases.
My search include this: eval series=case(VE=7,'ok',VE=3,'ko',VE=2,'attempt') | chart count by series,day,hour.
I don t able to have the several case name in column and day and hour in line.

Thx by advance
Laura

Tags (1)
0 Karma

lguinn2
Legend

I don't understand your question, but I see a problem in your case statement:

yoursearchhere |
eval series=case(VE==7,"ok",VE==3,"ko",VE==2,"attempt") | 
chart count by series,day,hour

I assume that day and hour are valid fields for all the events returned by the search? Are you sure that you want a chart and not a timechart? Here is a version that uses the timechart command instead:

yoursearchhere |
eval series=case(VE==7,"ok",VE==3,"ko",VE==2,"attempt") | 
timechart span=1h count by series
0 Karma
Get Updates on the Splunk Community!

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...