Splunk Search

Sparkline and Trend Indicator splunk

dchalasani
Path Finder

Hi,

I did Sparkline and Trend Indicator splunk as compared to lastweek.

In the result it showing as 92 means in 2 digit value only it is showing. Actually it has to show in like 9240000 like this.

Can any one please help me with this.

source code

<earliest>-7d</earliest>
      <latest>-60m@m</latest>
      <sampleRatio>1</sampleRatio>
    </search>
    <option name="trendColorInterpretation">standard</option>
    <option name="trendDisplayMode">absolute</option>
    <option name="trendInterval">-1h</option>
    <option name="colorBy">value</option>
    <option name="colorMode">none</option>
    <option name="numberPrecision">0</option>
    <option name="showTrendIndicator">1</option>
    <option name="showSparkline">1</option>
    <option name="useColors">0</option>
    <option name="useThousandSeparators">1</option>
    <option name="underLabel">Compared to lastweek</option>

Thanks

0 Karma
1 Solution

niketn
Legend

Do you want to bucket alert_risk_level in 1 hour window? Use following query instead

index=aws sourcetype=description earliest=-7d 
| timechart span=1h count(alert_risk_level) as Risk_Identified
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

View solution in original post

0 Karma

niketn
Legend

Do you want to bucket alert_risk_level in 1 hour window? Use following query instead

index=aws sourcetype=description earliest=-7d 
| timechart span=1h count(alert_risk_level) as Risk_Identified
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

dchalasani
Path Finder

Thanks Nike!

0 Karma

niketn
Legend

@dchalasani, glad it worked. I have converted to answer. Please Accept Answer to close this question.

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

dchalasani
Path Finder

Ok...and The Trend Indicator is showing very small.. Can we make it big(Trend Indicator) to show in a effective way.

Thanks

0 Karma

niketn
Legend

All single value elements adjust according to the size of panel and amount of data. You can color your single value panel based on trends to make the same obvious. You should be able to Edit Panel and choose these settings from Format menu.

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

dchalasani
Path Finder

And I used string as

index=aws sourcetype=description earliest=-7d | stats count as alert_risk_level by _time | timechart span=60m max(alert_risk_level) | rename max(alert_risk_level) as Risk_Identified

0 Karma
Get Updates on the Splunk Community!

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...