Dashboards & Visualizations

How to re-organize a statistics table in dashboard? (like have 3 columns in a greater column, etc)

jyamie
Explorer

Hi,

I am trying to re-organize my table, by moving some fields to become columns rather than rows, but also keeping some to be rows.

This is what I have:
_time........................field1....field2 ......99th_perc......avg
08/02/2015 0:00.......A............Y..............903..............342
08/02/2015 0:00.......B............ Z..............2131..............676
08/02/2015 0:00.......C............Y..............604..............319
08/02/2015 0:00.......D............Z..............1433..............190
08/03/2015 0:00.......A............Y..............1197 ..............200
08/03/2015 0:00.......B............Z..............1038..............160
08/03/2015 0:00.......C............Y..............419..............146
08/03/2015 0:00.......D............Z..............327..............234

This is what I want:
.....................................Y..........................................................Z

...................................A...........................C............................B...........................D

...................................99th_perc.....avg...99th_perc...avg...99th_perc...avg...99th_perc..... avg
08/02/2015 0:00........903................342.........604.......319....2131...........676....1433............190
08/03/2015 0:00........1197..............200......... 419.......146....1038...........160....327............234

How to I turn field 1 and field 2 into columns while keeping time as a row?

Thanks in advance

0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

Something like this should do, append to your search building the first table:

... | eval {field1}_{field2}_99th_perc = 99th_perc | eval {field1}_{field2}_avg = avg | stats values(*_*_*) as *_*_* by _time

Note, Splunk doesn't really do multi-layered columns, so this is a bit ugly.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Something like this should do, append to your search building the first table:

... | eval {field1}_{field2}_99th_perc = 99th_perc | eval {field1}_{field2}_avg = avg | stats values(*_*_*) as *_*_* by _time

Note, Splunk doesn't really do multi-layered columns, so this is a bit ugly.

jyamie
Explorer

Thank you! This worked very well.

0 Karma
Get Updates on the Splunk Community!

Splunk APM & RUM | Upcoming Planned Maintenance

There will be planned maintenance of Splunk APM’s and Splunk RUM’s streaming infrastructure in the coming ...

Part 2: Diving Deeper With AIOps

Getting the Most Out of Event Correlation and Alert Storm Detection in Splunk IT Service Intelligence   Watch ...

User Groups | Upcoming Events!

If by chance you weren't already aware, the Splunk Community is host to numerous User Groups, organized ...