<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Change color of Column Chart bars based on average of last week in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570743#M198897</link>
    <description>&lt;P&gt;Dear Splunk Community,&lt;/P&gt;&lt;P&gt;I have the following statistics table and corresponding column chart that show the amount of errors per server:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bleepie_0-1634122623362.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/16389iF36614D07B687E92/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Bleepie_0-1634122623362.png" alt="Bleepie_0-1634122623362.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;And&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bleepie_1-1634122633022.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/16390iAFF8B8CB647B4AD5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Bleepie_1-1634122633022.png" alt="Bleepie_1-1634122633022.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Right now I am changing the colors on the column chart based on a static value like so:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="myIndex" 
host="myHostOne*" OR host="myHostTwo*" 
source="mySource" 
ERROR 
NOT WARN
CTJT*
| table host, errors
| eval errors = host | stats count by host
| eval redCount = if(count&amp;gt;50,count,0)
| eval yellowCount = if(count&amp;lt;=50 AND count&amp;gt;25,count,0)
| eval greenCount = if(count &amp;lt;=25,count,0)
| fields - count
| dedup host
| rex field=host mode=sed "s/\..*$//"
| sort host asc
| rename host AS "Servers"
| rename count AS "Foutmeldingen"&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;The above uses a time range of "last 24 hours". I would like to change the colors of the bars (green, yellow, red) when a certain percentage of errors has been reached, based on the average of last week.&lt;/P&gt;&lt;P&gt;To summarize, I would like to:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Somehow get the average amount of errors per server per day from the last 7 days&lt;/LI&gt;&lt;LI&gt;Then specify a percentage for each color (e.g if the amount of errors today are 25% more than the average of last week, make the bar red)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I have no idea on how to do this, can anyone help? Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 13 Oct 2021 11:01:30 GMT</pubDate>
    <dc:creator>Bleepie</dc:creator>
    <dc:date>2021-10-13T11:01:30Z</dc:date>
    <item>
      <title>Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570743#M198897</link>
      <description>&lt;P&gt;Dear Splunk Community,&lt;/P&gt;&lt;P&gt;I have the following statistics table and corresponding column chart that show the amount of errors per server:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bleepie_0-1634122623362.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/16389iF36614D07B687E92/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Bleepie_0-1634122623362.png" alt="Bleepie_0-1634122623362.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;And&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bleepie_1-1634122633022.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/16390iAFF8B8CB647B4AD5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Bleepie_1-1634122633022.png" alt="Bleepie_1-1634122633022.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Right now I am changing the colors on the column chart based on a static value like so:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="myIndex" 
host="myHostOne*" OR host="myHostTwo*" 
source="mySource" 
ERROR 
NOT WARN
CTJT*
| table host, errors
| eval errors = host | stats count by host
| eval redCount = if(count&amp;gt;50,count,0)
| eval yellowCount = if(count&amp;lt;=50 AND count&amp;gt;25,count,0)
| eval greenCount = if(count &amp;lt;=25,count,0)
| fields - count
| dedup host
| rex field=host mode=sed "s/\..*$//"
| sort host asc
| rename host AS "Servers"
| rename count AS "Foutmeldingen"&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;The above uses a time range of "last 24 hours". I would like to change the colors of the bars (green, yellow, red) when a certain percentage of errors has been reached, based on the average of last week.&lt;/P&gt;&lt;P&gt;To summarize, I would like to:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Somehow get the average amount of errors per server per day from the last 7 days&lt;/LI&gt;&lt;LI&gt;Then specify a percentage for each color (e.g if the amount of errors today are 25% more than the average of last week, make the bar red)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I have no idea on how to do this, can anyone help? Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 11:01:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570743#M198897</guid>
      <dc:creator>Bleepie</dc:creator>
      <dc:date>2021-10-13T11:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570749#M198898</link>
      <description>&lt;LI-CODE lang="markup"&gt;index="myIndex" earliest=-7d@d latest=@d
host="myHostOne*" OR host="myHostTwo*" 
source="mySource" 
ERROR 
NOT WARN
CTJT*
| bin _time span=1d
| stats count by host _time
| eventstats avg(count) as average by host 
| where _time=relative_time(now(),"-1d@d")
| eval red=if(count&amp;gt;average*1.25,count,0)
| eval yellow=if(count&amp;lt;=average*1.25 AND count&amp;gt;average,count,0)
| eval green=if(count&amp;lt;=average,count,0)
| fields - _time count average
| rex field=host mode=sed "s/\..*$//"
| sort host asc
| rename host AS "Servers"&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 13 Oct 2021 12:05:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570749#M198898</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-10-13T12:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570755#M198899</link>
      <description>&lt;P&gt;Unfortunately I get 0 results in the table as the counts are all 0, I do however get events:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bleepie_0-1634128567770.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/16392iCD004110D7B33248/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Bleepie_0-1634128567770.png" alt="Bleepie_0-1634128567770.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bleepie_1-1634128576492.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/16393i167092A2C4BAA80A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Bleepie_1-1634128576492.png" alt="Bleepie_1-1634128576492.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Any clue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 12:36:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570755#M198899</guid>
      <dc:creator>Bleepie</dc:creator>
      <dc:date>2021-10-13T12:36:29Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570758#M198900</link>
      <description>&lt;P&gt;EDIT: I missed something, looks like this now, seems something with the date is still a bit off:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bleepie_0-1634128743202.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/16394i54B869AF7498A5B9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Bleepie_0-1634128743202.png" alt="Bleepie_0-1634128743202.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 12:39:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570758#M198900</guid>
      <dc:creator>Bleepie</dc:creator>
      <dc:date>2021-10-13T12:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570759#M198901</link>
      <description>&lt;P&gt;You had&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| table host, errors&lt;/LI-CODE&gt;&lt;P&gt;which you didn't need.&lt;/P&gt;&lt;P&gt;The dates are based on yesterday and the last 7 days - if you want today (so far), change the latest to now() and the where clause to include data from today instead of yesterday&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 12:42:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570759#M198901</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-10-13T12:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570767#M198904</link>
      <description>&lt;P&gt;How do I correctly adjust the where clause? I want the last 24 hours (to match the statistics table) but using -24h or &lt;A href="mailto:-24h@s" target="_blank" rel="noopener"&gt;-24h@s&lt;/A&gt;&amp;nbsp;gives me&amp;nbsp;&lt;STRONG&gt;no results found.&amp;nbsp;&lt;/STRONG&gt;message.&lt;BR /&gt;&lt;BR /&gt;Like so:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| where _time=relative_time(now(),"-24h@s")
| where _time=relative_time(now(),"-24h")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 12:55:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570767#M198904</guid>
      <dc:creator>Bleepie</dc:creator>
      <dc:date>2021-10-13T12:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570768#M198905</link>
      <description>&lt;P&gt;The issue you have is the mismatch between last 24 hours and last 7 days - last 24 hours will be snapped to the hour whereas last 7 days will be snapped to the day. This makes the query more complicated, so please can you specify exactly which time periods you want to compare, including the snapping you want for each period&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 13:01:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570768#M198905</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-10-13T13:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570772#M198906</link>
      <description>&lt;P&gt;Can we solve this issue if we change both the table and the chart to&amp;nbsp;&lt;STRONG&gt;today&lt;/STRONG&gt; so both times are days rather then a mismatch between hours and days? That would work for me. Not sure if now() works like that and if it is possible. Thoughts?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 13:10:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570772#M198906</guid>
      <dc:creator>Bleepie</dc:creator>
      <dc:date>2021-10-13T13:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570776#M198907</link>
      <description>&lt;LI-CODE lang="markup"&gt;index="myIndex" earliest=-7d@d latest=now
host="myHostOne*" OR host="myHostTwo*" 
source="mySource" 
ERROR 
NOT WARN
CTJT*
| bin _time span=1d
| stats count by host _time
| eventstats avg(count) as average by host 
| where _time=relative_time(now(),"@d")
| eval red=if(count&amp;gt;average*1.25,count,0)
| eval yellow=if(count&amp;lt;=average*1.25 AND count&amp;gt;average,count,0)
| eval green=if(count&amp;lt;=average,count,0)
| fields - _time count average
| rex field=host mode=sed "s/\..*$//"
| sort host asc
| rename host AS "Servers"&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 13 Oct 2021 13:21:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570776#M198907</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-10-13T13:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570778#M198908</link>
      <description>&lt;P&gt;Thanks a lot &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 13:23:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/570778#M198908</guid>
      <dc:creator>Bleepie</dc:creator>
      <dc:date>2021-10-13T13:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571303#M199076</link>
      <description>&lt;P&gt;Not sure if I can ask this in this topic as a solution has been marked but, with the exact same query the following works:&lt;/P&gt;&lt;P&gt;For today:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;earliest=-7d@d latest=now
| where _time=relative_time(now(),"@d")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;For yesterday:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;earliest=-7d@d latest=now
| where _time=relative_time(now(),"-1d@d")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;Even this works:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;earliest=-7d@d latest=now
| where _time=relative_time(now(),"-2d@d")&lt;/LI-CODE&gt;&lt;P&gt;But this does not work:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;earliest=-1mon@mon latest=now
| where _time=relative_time(now(),"-7d@d")&lt;/LI-CODE&gt;&lt;P&gt;The last query only a handfull of results (even less then todays). Any idea why? I am expecting hundreds/thousands of results.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 10:34:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571303#M199076</guid>
      <dc:creator>Bleepie</dc:creator>
      <dc:date>2021-10-18T10:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571306#M199078</link>
      <description>&lt;P&gt;You may have hit some limit on the number of events or amount of memory used. Do you get any errors / warnings when the job is executed?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 10:40:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571306#M199078</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-10-18T10:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571313#M199082</link>
      <description>&lt;P&gt;I got no errors. I tried changing the query like so:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;earliest=-2d@d latest=now
| where _time=relative_time(now(),"-2d@d")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It results 2959 events and the following statistics:&lt;/P&gt;&lt;P&gt;Servers green red&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;01&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;TD&gt;388&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02&lt;/TD&gt;&lt;TD&gt;110&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;03&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;TD&gt;1243&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;04&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;TD&gt;251&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;05&lt;/TD&gt;&lt;TD&gt;177&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;06&lt;/TD&gt;&lt;TD&gt;189&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;07&lt;/TD&gt;&lt;TD&gt;193&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When changing to 3 days:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;earliest=-3d@d latest=now
| where _time=relative_time(now(),"-3d@d")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It results 3024 events.&lt;/P&gt;&lt;P&gt;But this is the result in statistics:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Servers green red&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;01&lt;/TD&gt;&lt;TD&gt;11&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;02&lt;/TD&gt;&lt;TD&gt;26&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;03&lt;/TD&gt;&lt;TD&gt;13&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;04&lt;/TD&gt;&lt;TD&gt;15&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 11:14:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571313#M199082</guid>
      <dc:creator>Bleepie</dc:creator>
      <dc:date>2021-10-18T11:14:29Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571317#M199086</link>
      <description>&lt;P&gt;That looks correct&lt;/P&gt;&lt;P&gt;There were 2959 events between the beginning of the day before yesterday and now, and 3024 between the day before that and now 3024 - 2959 = 65 which is the number of events on that previous day, 11+26+13+15 = 65&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 11:29:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571317#M199086</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-10-18T11:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571324#M199091</link>
      <description>&lt;P&gt;Aaah okay I was under the impression that when using relative_time you fetch everything in between start date and now. I was expecting all the errors counted from in between now and 3 days ago. How would I edit this query to get all errors counted from the past 7 days?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 12:08:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571324#M199091</guid>
      <dc:creator>Bleepie</dc:creator>
      <dc:date>2021-10-18T12:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571326#M199093</link>
      <description>&lt;P&gt;relative_time will give you an epoch date time value. You can compare _time (from the events in the pipeline) to that point in time and keep everything equal to or after that time.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| where _time&amp;gt;=relative_time(now(),"-7d@d")&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 18 Oct 2021 12:13:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571326#M199093</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-10-18T12:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: Change color of Column Chart bars based on average of last week</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571330#M199095</link>
      <description>&lt;P&gt;Much obliged, got it all working now.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 12:30:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Change-color-of-Column-Chart-bars-based-on-average-of-last-week/m-p/571330#M199095</guid>
      <dc:creator>Bleepie</dc:creator>
      <dc:date>2021-10-18T12:30:37Z</dc:date>
    </item>
  </channel>
</rss>

