<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to create a single value panel that changes based on weighted values? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285059#M86195</link>
    <description>&lt;P&gt;Hmm still not working, here is an example of my alerts hopefully this can help&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[nitro_prod_stores__500_alert]
action.email.inline = 1
action.summary_index = 1
action.summary_index._name = nitro_prod_summary
alert.expires = 10s
alert.suppress = 0
alert.track = 1
auto_summarize.dispatch.earliest_time = -1d@h
cron_schedule = 03 * * * *
description = Webstore crosses 500
enableSched = 1
realtime_schedule = 0
search = index=nitro_webstore  "500" NOT("*.500" OR "200") earliest=-80m@m latest=-20m@m | stats count | where count&amp;gt;74 |**eval weight = 50** |eval Metric_Category="Application" | eval Metric="Health" | eval Metric_Type="Status" | eval Application="Webstore Services" | eval Key="Count" | eval Frequency="60 minutes" | eval ID="NA" | eval Description="Webstore crosses 500" | eval Value=coalesce(NA,count) | eval Alert_Type="low" | eval Alert="Yes" | eval Service-Now_Assignment_Group="EC-IScore" | eval Violation="1" | eval _time=now() | table _time Metric_Category Metric Metric_Type Application Key ID Description Frequency Value Alert_Type Alert Service-Now_Assignment_Group Violation Search_name
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Thu, 15 Sep 2016 14:00:32 GMT</pubDate>
    <dc:creator>JoshuaJohn</dc:creator>
    <dc:date>2016-09-15T14:00:32Z</dc:date>
    <item>
      <title>How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285053#M86189</link>
      <description>&lt;P&gt;I want to create a single value panel that starts at 100, and when a specific alert goes off with an assigned weight, that weight is removed from the single value panel. So alert with a weight of 25 fires, the single value panel is now at 75 which is yellow.&lt;/P&gt;

&lt;P&gt;Greater than 80 is green&lt;BR /&gt;
50-80 is yellow&lt;BR /&gt;
below 50 is red&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/1860iE5AE03B9AFF90975/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;I have this search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="nitro_prod_summary" earliest=-1h@m latest=@m [| `nitro_prod_cmdb` | search Category="ECOMM CUSTOMER FACING"  OR Category="ECOMM OPERATIONS" Service="*" Application="*" weight="*"| stats count by Application | table Application] | join Application [ | `nitro_prod_cmdb` ] | search Alert_Type="*" Metric_Category="*" | eval FilterKey=Description.ID | dedup FilterKey | table Alert_Type Category Service Application Metric_Category Description Key ID| rename Metric_Category as "Type" Alert_Type as "Alert" count as Count | sort +Alert
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Which creates a table like this:&lt;BR /&gt;
&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/1861i98250958ABC34CD7/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;I want to create this single panel for "webstore" so I want to filter from the search above only Application="WebStore Services" then add the weights from all of the instances and subtract it from 100, if this number is greater than 80 it is green, 50-80 is yellow and below 50 is red. It should also still say webstore and the color should be responding to that number.&lt;/P&gt;

&lt;P&gt;I did not put weight into the table but it is being pulled from the alerts just not being placed anywhere.&lt;/P&gt;

&lt;P&gt;Any ideas on making this single value panel?&lt;BR /&gt;
Few extra points for this loaded question!&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2016 19:44:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285053#M86189</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2016-09-14T19:44:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285054#M86190</link>
      <description>&lt;P&gt;See if this gets you going in the right direction&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index="nitro_prod_summary" earliest=-1h@m latest=@m [| `nitro_prod_cmdb` | search Category="ECOMM CUSTOMER FACING"  OR Category="ECOMM OPERATIONS" Service="*" Application="*" weight="*"| stats count by Application | table Application] | join Application [ | `nitro_prod_cmdb` ] | search Alert_Type="*" Metric_Category="*" | eval FilterKey=Description.ID | dedup FilterKey | table Alert_Type Category Service Application Metric_Category Description Key ID weights | rename Metric_Category as "Type" Alert_Type as "Alert" count as Count | sort +Alert where match(Application, "([Ww]eb[Ss]tore)" | stats sum(weights) as weight | eval weight=100-weight | rangemap field=weight low=100-80 elevated=50-79 default=severe
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 14 Sep 2016 20:02:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285054#M86190</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-09-14T20:02:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285055#M86191</link>
      <description>&lt;P&gt;Not quite, nothing is showing up here. I would need this to work if there were no active alerts as well, but right now there are but it isn't producing anything.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2016 20:17:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285055#M86191</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2016-09-14T20:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285056#M86192</link>
      <description>&lt;P&gt;Did you add the weights field to the table?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2016 20:18:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285056#M86192</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-09-14T20:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285057#M86193</link>
      <description>&lt;P&gt;I did but to no avail &lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2016 20:36:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285057#M86193</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2016-09-14T20:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285058#M86194</link>
      <description>&lt;P&gt;Try the updated query&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2016 20:45:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285058#M86194</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-09-14T20:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285059#M86195</link>
      <description>&lt;P&gt;Hmm still not working, here is an example of my alerts hopefully this can help&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[nitro_prod_stores__500_alert]
action.email.inline = 1
action.summary_index = 1
action.summary_index._name = nitro_prod_summary
alert.expires = 10s
alert.suppress = 0
alert.track = 1
auto_summarize.dispatch.earliest_time = -1d@h
cron_schedule = 03 * * * *
description = Webstore crosses 500
enableSched = 1
realtime_schedule = 0
search = index=nitro_webstore  "500" NOT("*.500" OR "200") earliest=-80m@m latest=-20m@m | stats count | where count&amp;gt;74 |**eval weight = 50** |eval Metric_Category="Application" | eval Metric="Health" | eval Metric_Type="Status" | eval Application="Webstore Services" | eval Key="Count" | eval Frequency="60 minutes" | eval ID="NA" | eval Description="Webstore crosses 500" | eval Value=coalesce(NA,count) | eval Alert_Type="low" | eval Alert="Yes" | eval Service-Now_Assignment_Group="EC-IScore" | eval Violation="1" | eval _time=now() | table _time Metric_Category Metric Metric_Type Application Key ID Description Frequency Value Alert_Type Alert Service-Now_Assignment_Group Violation Search_name
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 15 Sep 2016 14:00:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285059#M86195</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2016-09-15T14:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285060#M86196</link>
      <description>&lt;P&gt;What do you get when you keep only the &lt;CODE&gt;where&lt;/CODE&gt; segement and remove everything else? Can you copy the list of fields you see?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 17:00:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285060#M86196</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-09-15T17:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285061#M86197</link>
      <description>&lt;P&gt;"count&lt;BR /&gt;
112"&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 18:13:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285061#M86197</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2016-09-15T18:13:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285062#M86198</link>
      <description>&lt;P&gt;My bad. I meant keep the &lt;CODE&gt;where&lt;/CODE&gt; and remove everything else from the query I posted. Not the alert query.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 18:30:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285062#M86198</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-09-15T18:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285063#M86199</link>
      <description>&lt;P&gt;So I tried that and I got no results but when I removed the weight category I received the original table again as shown in the first post&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 18:45:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285063#M86199</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2016-09-15T18:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285064#M86200</link>
      <description>&lt;P&gt;Good. So where does the Weight come from? Is it a field in the main search? or one of the sub-searches? That field is needed for the query to execute&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 19:31:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285064#M86200</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-09-15T19:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285065#M86201</link>
      <description>&lt;P&gt;Makes sense, my bad. I will get all of this set up correctly, and get back here.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 20:23:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285065#M86201</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2016-09-15T20:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285066#M86202</link>
      <description>&lt;P&gt;Can I append weight to the main search? It is in the alerts&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 20:52:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285066#M86202</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2016-09-15T20:52:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285067#M86203</link>
      <description>&lt;P&gt;Ok so made some edits, sorry for the delay. The search now works but I need it to still display when there are no alerts coming in, any suggestions for that? Right now it will just say "no results"&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2016 15:24:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285067#M86203</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2016-09-19T15:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a single value panel that changes based on weighted values?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285068#M86204</link>
      <description>&lt;P&gt;Sorry for the late reply, I got the search working but now I need it to return green even when the search provides no results because no alerts are firing currently? Any suggestions?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2016 18:12:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-single-value-panel-that-changes-based-on/m-p/285068#M86204</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2016-09-19T18:12:11Z</dc:date>
    </item>
  </channel>
</rss>

