Dashboards & Visualizations

Bar Chart Splunk6

xisura
Communicator

Hi!

Is there a way in splunk 6 to change the color of the bar graph based on the search result like in rangemap??

Thanks in Advanced!
Jarize

Tags (2)
0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

You can do something like this:

some search | timechart avg(some_value) as avg | eval green = case(avg < 50, avg) | eval yellow = case(avg < 80, avg) | eval red = case(avg >= 80, avg) | fields - avg

Display the resulting chart as a stacked column chart, and set the colors to green, yellow and red.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

You can do something like this:

some search | timechart avg(some_value) as avg | eval green = case(avg < 50, avg) | eval yellow = case(avg < 80, avg) | eval red = case(avg >= 80, avg) | fields - avg

Display the resulting chart as a stacked column chart, and set the colors to green, yellow and red.

Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...