Splunk Search

How can I get the graph that only displays percentage when using timechart?

Min1025
Explorer

I have a query below that is showing "PriceChangeCount", "Total" and "PriceChangeRate" in graph, How can I get the graph that only displays the PriceChangeRate in graph?

index=xxx sourcetype=xxx|eval priceChangeCnt=case(Id=xxx,"Yes") | timechart span=1h count as Total, count(priceChangeCnt) as PriceChangeCount | eval PriceChangeRate=(PriceChangeCount/Total)*100

Tags (2)
0 Karma
1 Solution

adonio
Ultra Champion

try this:

index=xxx sourcetype=xxx
|eval priceChangeCnt=case(Id=xxx,"Yes") 
|bin _time span=1h 
| stats count as Total, count(priceChangeCnt) as PriceChangeCount by _time
| eval PriceChangeRate=(PriceChangeCount/Total)*100
| timechart span=1h max(PriceChangeRate) as m_PriceChangeRate

hope it helps

View solution in original post

0 Karma

adonio
Ultra Champion

try this:

index=xxx sourcetype=xxx
|eval priceChangeCnt=case(Id=xxx,"Yes") 
|bin _time span=1h 
| stats count as Total, count(priceChangeCnt) as PriceChangeCount by _time
| eval PriceChangeRate=(PriceChangeCount/Total)*100
| timechart span=1h max(PriceChangeRate) as m_PriceChangeRate

hope it helps

0 Karma

Min1025
Explorer

Hi adonio, many thanks! It works well.

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...