Splunk Enterprise Security

How do you customize colors in a bar chart?

snigdhasaxena
Communicator

I have been trying to customize the color of bars in a Bar chart as per the field values.

I have tried using eval/if, case as per suggestions in Splunk answers but none of it helps.

To edit the source,I applied charting.fieldcolors and charting.seriesColors but the color of bars in dashboard doesn't change.

| `xyz` 
| search comment=WAA OR 
    comment=CWMW OR 
    comment=PHSH OR 
    comment=PHSHMA OR 
    comment=PHSHWS OR 
    comment=IM OR 
    comment=3PI OR 
    comment=Other | replace WAA with "A" in comment| replace CWMW with "B" in comment| replace PHSH with "C" in comment| replace PHSHMA with "D" in comment | replace PHSHWS with "E" in comment| replace IM with "F" in comment| replace 3PI with "G" in comment
| stats count by comment  | eventstats sum(count) as perc | eval perc=round(count*100/perc,2)
|eval v1=if(comment="A","A",1)
|eval v2=if(comment="B","B",2)
|eval v3 =if(comment="C","C",3)
|eval v4=if(comment="D","D",4)
|eval v5=if(comment="E","E",5)
|eval v6=if(comment="F","F",6)
| table comment perc

Note that the chart is stacked.

I have tried all the solutions in splunk.answers, but nothing works

xml code :

{"v1":0xFF0000,"v2":0xFFFF00,"v3":0x00FF00,"v4":0xFF0000,"v5":0xFFFF00,"v6":0x00FF00}
0 Karma
1 Solution

niketn
Legend

@snigdhasaxena before you work with coloring fields, there are some of the things you should look at in your existing query
1) Move search filters to base search
2) replace should be after stats
3) eval v1, v2... do not seem to add any value as you are dropping the fields.
4) seems like you are better off using top command instead of using eventstats to calculate percent.

FYI, Your existing query should show colors if you use pie chart visualization, but not column or bar chart which needs a transpose of axis.

Following is an example with Splunk's _internal index where I have used 3 components instead of 7 comment values that you have used.

index=_internal sourcetype=splunkd component IN ("Metrics","PeriodicHealthReporter","ModularInputs")
| top 3 component showperc=t showcount=f
| eval percent=round(percent,2)
| fields - _*
| transpose 3 header_field=component column_name=component

PS: Output of first three command should be similar to what you have in your current search.

Please try out and confirm!

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

View solution in original post

0 Karma

niketn
Legend

@snigdhasaxena before you work with coloring fields, there are some of the things you should look at in your existing query
1) Move search filters to base search
2) replace should be after stats
3) eval v1, v2... do not seem to add any value as you are dropping the fields.
4) seems like you are better off using top command instead of using eventstats to calculate percent.

FYI, Your existing query should show colors if you use pie chart visualization, but not column or bar chart which needs a transpose of axis.

Following is an example with Splunk's _internal index where I have used 3 components instead of 7 comment values that you have used.

index=_internal sourcetype=splunkd component IN ("Metrics","PeriodicHealthReporter","ModularInputs")
| top 3 component showperc=t showcount=f
| eval percent=round(percent,2)
| fields - _*
| transpose 3 header_field=component column_name=component

PS: Output of first three command should be similar to what you have in your current search.

Please try out and confirm!

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

snigdhasaxena
Communicator

Thanks a lot, it worked for me 🙂

0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...