<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to display graph column for zero value in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-graph-column-for-zero-value/m-p/387737#M113095</link>
    <description>&lt;P&gt;Thanks. However I'm having a bit of trouble with the sentinel value implementation (found on pages 25-27).&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=myIndex AND sourcetype=mySource AND ("string1" OR "string2") | eval split=if(match(_raw, ".*string1*."), "Requests", "Timeouts") | inputlookup append=true Timeouts | chart count by split
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The above query returns 'The lookup table Timeouts is invalid'. What am I missing?&lt;/P&gt;</description>
    <pubDate>Thu, 14 Feb 2019 17:08:51 GMT</pubDate>
    <dc:creator>tmaurst</dc:creator>
    <dc:date>2019-02-14T17:08:51Z</dc:date>
    <item>
      <title>How to display graph column for zero value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-graph-column-for-zero-value/m-p/387735#M113093</link>
      <description>&lt;P&gt;I have a bar graph that charts two values. When one of the values is 0, the graph removes the column altogether. This makes it difficult to ascertain that two values are being compared. How can I keep a placeholder for a 0 value in the graph with the field name intact?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 23:42:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-graph-column-for-zero-value/m-p/387735#M113093</guid>
      <dc:creator>tmaurst</dc:creator>
      <dc:date>2019-02-13T23:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to display graph column for zero value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-graph-column-for-zero-value/m-p/387736#M113094</link>
      <description>&lt;P&gt;This is the &lt;CODE&gt;Sentinel Search&lt;/CODE&gt; problem discussed (with solution) here:&lt;/P&gt;

&lt;P&gt;&lt;A href="https://conf.splunk.com/session/2015/conf2015-LookupTalk.pdf"&gt;https://conf.splunk.com/session/2015/conf2015-LookupTalk.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Feb 2019 00:19:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-graph-column-for-zero-value/m-p/387736#M113094</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-02-14T00:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to display graph column for zero value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-graph-column-for-zero-value/m-p/387737#M113095</link>
      <description>&lt;P&gt;Thanks. However I'm having a bit of trouble with the sentinel value implementation (found on pages 25-27).&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=myIndex AND sourcetype=mySource AND ("string1" OR "string2") | eval split=if(match(_raw, ".*string1*."), "Requests", "Timeouts") | inputlookup append=true Timeouts | chart count by split
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The above query returns 'The lookup table Timeouts is invalid'. What am I missing?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Feb 2019 17:08:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-graph-column-for-zero-value/m-p/387737#M113095</guid>
      <dc:creator>tmaurst</dc:creator>
      <dc:date>2019-02-14T17:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to display graph column for zero value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-graph-column-for-zero-value/m-p/387738#M113096</link>
      <description>&lt;P&gt;If you are creating an ad-hoc lookup, you must use &lt;CODE&gt;Timeouts.csv&lt;/CODE&gt;.  When you specify a lookup without &lt;CODE&gt;.csv&lt;/CODE&gt; on the end, Splunk looks for a &lt;CODE&gt;Lookup definition&lt;/CODE&gt; named, in this case, &lt;CODE&gt;Timeouts&lt;/CODE&gt;, to see if it is a &lt;CODE&gt;Lookup file&lt;/CODE&gt; or a &lt;CODE&gt;KV Store&lt;/CODE&gt;.  It does not find such and gives you this error.  The other way around it is to create a lookup definition called&lt;CODE&gt;Timeouts&lt;/CODE&gt; that is file-based as &lt;CODE&gt;Timeouts.csv&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;Don't forget to click &lt;CODE&gt;Accept&lt;/CODE&gt; to close the question.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Feb 2019 20:56:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-graph-column-for-zero-value/m-p/387738#M113096</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-02-14T20:56:30Z</dc:date>
    </item>
  </channel>
</rss>

