Dashboards & Visualizations

Bar Chart Splunk6

xisura
Communicator

Hi!

Is there a way in splunk 6 to change the color of the bar graph based on the search result like in rangemap??

Thanks in Advanced!
Jarize

Tags (2)
0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

You can do something like this:

some search | timechart avg(some_value) as avg | eval green = case(avg < 50, avg) | eval yellow = case(avg < 80, avg) | eval red = case(avg >= 80, avg) | fields - avg

Display the resulting chart as a stacked column chart, and set the colors to green, yellow and red.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

You can do something like this:

some search | timechart avg(some_value) as avg | eval green = case(avg < 50, avg) | eval yellow = case(avg < 80, avg) | eval red = case(avg >= 80, avg) | fields - avg

Display the resulting chart as a stacked column chart, and set the colors to green, yellow and red.

Get Updates on the Splunk Community!

Happy CX Day to our Community Superheroes!

Happy 10th Birthday CX Day!What is CX Day? It’s a global celebration recognizing innovation and success in the ...

Check out This Month’s Brand new Splunk Lantern Articles

Splunk Lantern is a customer success center providing advice from Splunk experts on valuable data insights, ...

Routing Data to Different Splunk Indexes in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. The OpenTelemetry project is the second largest ...