Dashboards & Visualizations

Trend or sparkline

ReachDataScient
Explorer

I have the below search which shows 3 columns....the field1, index list and events count. How can I add a trend line or a spark line to show if the event count is increasing or decreasing.

| tstats count by index
| join index type=inner
| inputlookup LookUp1
| eval index=lower(index)
| table field1,index,count
| sort field1 asc]
| stats list(index) as index, sum(count) as count by field1

Tags (1)
0 Karma

maciep
Champion

you can add _time to the by clause in your tstats command to bucket the data over time. I'm not sure what your lookup does exactly and/or if you really need a list of indexes in the results, but maybe this will point you in the right direction

|  tstats count by index _time span=1h
.
.
.
| timechart span=1h sum(count) as count by field1
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...