Splunk Search

Adding Sparkline based on eval variable

itssaad14
Engager

I have a search which captures data from all the machines on the network and calculates OS Health of each machine (host). I am displaying it like this
OSHealth DeviceCount Percentage
5 288 35%
4 150 20%

I want to add a sparkline to show the trend of changing percentage and add it like another column. I have tried alot based on splunk docs but it always show as a straight line. I would really appreciate some help. My search is attached below

| stats count(host) AS DeviceCount by OSHealth
| eventstats sum(DeviceCount) AS SumDevice
| eval Percentage = round((DeviceCount/SumDevice)*100,1)
| stats sparkline avg(Percentage) as Trend by OSHealth DeviceCount
| table OSHealth DeviceCount Percentage

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Sparklines require _time to work. However, the initial stats command is returning only the DeviceCount and OSHealth fields.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

.conf25 Global Broadcast: Don’t Miss a Moment

Hello Splunkers, .conf25 is only a click away.  Not able to make it to .conf25 in person? No worries, you can ...

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...