Splunk Search

Adding Sparkline based on eval variable

itssaad14
Engager

I have a search which captures data from all the machines on the network and calculates OS Health of each machine (host). I am displaying it like this
OSHealth DeviceCount Percentage
5 288 35%
4 150 20%

I want to add a sparkline to show the trend of changing percentage and add it like another column. I have tried alot based on splunk docs but it always show as a straight line. I would really appreciate some help. My search is attached below

| stats count(host) AS DeviceCount by OSHealth
| eventstats sum(DeviceCount) AS SumDevice
| eval Percentage = round((DeviceCount/SumDevice)*100,1)
| stats sparkline avg(Percentage) as Trend by OSHealth DeviceCount
| table OSHealth DeviceCount Percentage

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Sparklines require _time to work. However, the initial stats command is returning only the DeviceCount and OSHealth fields.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...