Getting Data In

How to query key values and draw timechart?

pavan257
New Member

Here is the sample data.

RED: 2086
GREEN: 1579
WHITE: 159
PINK: 348
ORANGE: 0

Tags (1)
0 Karma
1 Solution

woodcock
Esteemed Legend

This should do it:

...  | rex max_match=0 field=raw "(?<lineData>[^:]+:\s*\d+)" | mvexpand lineData | rex field=lineData "(?<color>[^:]+):\s*(?<count>\d+)" | timechart span=1h sum(count) AS count BY color

This makes your X-axis interval 1 hour.

View solution in original post

0 Karma

woodcock
Esteemed Legend

This should do it:

...  | rex max_match=0 field=raw "(?<lineData>[^:]+:\s*\d+)" | mvexpand lineData | rex field=lineData "(?<color>[^:]+):\s*(?<count>\d+)" | timechart span=1h sum(count) AS count BY color

This makes your X-axis interval 1 hour.

0 Karma

pavan257
New Member

No. this query just displaying the events but not the visualization, all these events come through a custom shell script which we made output as "sourcetype = weblogic_stdout" not sure, if that matters here.

0 Karma

pavan257
New Member

After further cleanup of y event.. this worked perfectly. Thanks Woodcock.

0 Karma

MuS
SplunkTrust
SplunkTrust

After you run the search, in the UI click on the Visualization tab and create what ever visualization you need.....

pavan257
New Member

I know, but this query was not representing any timechart to visualize.

0 Karma

woodcock
Esteemed Legend

You are going to have to replace ... with your base search. I tested this on your sample data: it works just fine.

0 Karma

pavan257
New Member
...  | rex max_match=0 field=_raw "(?[^:]+:\s*\d+)" | mvexpand lineData | rex field=_raw "(?[^:]+):\s*(?\d+)" | timechart span=1h sum(count) AS count BY color

with this query I am able to see only "RED", but I want to see other lines (GREEN, WHITE...) to be charted.

0 Karma

woodcock
Esteemed Legend

Is this 1 event or 5?

0 Karma

pavan257
New Member

This was one event.

0 Karma

rsennett_splunk
Splunk Employee
Splunk Employee

does your event have a timestamp? Do all the events contain all those fields? Just those fields? more? Less?

With Splunk... the answer is always "YES!". It just might require more regex than you're prepared for!
0 Karma

pavan257
New Member

Yes, I do have time stamp and all the events will have all these fields with different values.

0 Karma
Get Updates on the Splunk Community!

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...

New Year. New Skills. New Course Releases from Splunk Education

A new year often inspires reflection—and reinvention. Whether your goals include strengthening your security ...