<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Create TimeSpan Line Chart After Eval-ing in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/Create-TimeSpan-Line-Chart-After-Eval-ing/m-p/416204#M27363</link>
    <description>&lt;P&gt;@migquinn If your problem is resolved, please accept the answer to help future readers.&lt;/P&gt;</description>
    <pubDate>Sat, 15 Jun 2019 11:10:51 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2019-06-15T11:10:51Z</dc:date>
    <item>
      <title>Create TimeSpan Line Chart After Eval-ing</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Create-TimeSpan-Line-Chart-After-Eval-ing/m-p/416201#M27360</link>
      <description>&lt;P&gt;Do any experienced Splunkers know what needs to be changed to my query below in order to create a TimeSpan Line Chart over say the past 30 days for counts of the four Severity levels created by the Eval command?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=myIndex source=mySource host=myHost sourcetype=mySourceType | stats count(eval(severity="0" OR severity="1" OR severity="2")) as Low count(eval(severity="3" OR severity="4" OR severity="5")) as Medium count(eval(severity="6" OR severity="7" OR severity="8")) as High count(eval(severity="9" OR severity="10")) as Critical | table Low Medium High Critical | transpose | rename column as Severity "row 1" as Count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I have attached a screenshot and instead of the values on the right-hand side being 1 - 10, I'd like them to be Low, Medium etc...&lt;/P&gt;

&lt;P&gt;Thanks in advance&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/7182i2E29A8B8D7EE4E5F/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jun 2019 02:21:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Create-TimeSpan-Line-Chart-After-Eval-ing/m-p/416201#M27360</guid>
      <dc:creator>migquinn</dc:creator>
      <dc:date>2019-06-09T02:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: Create TimeSpan Line Chart After Eval-ing</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Create-TimeSpan-Line-Chart-After-Eval-ing/m-p/416202#M27361</link>
      <description>&lt;P&gt;Try this untested query:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=myIndex source=mySource host=myHost sourcetype=mySourceType 
| eval Severity=case(severity="0" OR severity="1" OR severity="2"), "Low", (severity="3" OR severity="4" OR severity="5"), "Medium", (severity="6" OR severity="7" OR severity="8"), "High", (severity="9" OR severity="10"), "Critical") 
| timechart count as Count by Severity
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 09 Jun 2019 17:33:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Create-TimeSpan-Line-Chart-After-Eval-ing/m-p/416202#M27361</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-06-09T17:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Create TimeSpan Line Chart After Eval-ing</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Create-TimeSpan-Line-Chart-After-Eval-ing/m-p/416203#M27362</link>
      <description>&lt;P&gt;Thanks for the input. It didn't work when I tried it but I took your command, switched it up a little and positioned it further up the query and it worked:&lt;/P&gt;

&lt;P&gt;index=myIndex source=mySource host=myHost sourcetype=mySourceType | timechart count(eval(severity="0" OR severity="1" OR severity="2")) as Low count(eval(severity="3" OR severity="4" OR severity="5")) as Medium count(eval(severity="6" OR severity="7" OR severity="8")) as High count(eval(severity="9" OR severity="10")) as Critical&lt;/P&gt;

&lt;P&gt;Again, thanks for your help on this!&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 23:31:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Create-TimeSpan-Line-Chart-After-Eval-ing/m-p/416203#M27362</guid>
      <dc:creator>migquinn</dc:creator>
      <dc:date>2019-06-12T23:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: Create TimeSpan Line Chart After Eval-ing</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Create-TimeSpan-Line-Chart-After-Eval-ing/m-p/416204#M27363</link>
      <description>&lt;P&gt;@migquinn If your problem is resolved, please accept the answer to help future readers.&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jun 2019 11:10:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Create-TimeSpan-Line-Chart-After-Eval-ing/m-p/416204#M27363</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-06-15T11:10:51Z</dc:date>
    </item>
  </channel>
</rss>

