Splunk Search

How do I create a stacked bar graph with 2 fields?

jhoang
Path Finder

Hi,

I am trying to create a stacked bar graph, using 2 fields.

First field is Level, second field is Urgency. I want to sort the columns based on Level, and displaying the number of different Urgency in the stacked column. See below, the long column would show 2 critical items, 1 high, and 1 medium items, for a total of 4 items.

Level Urgency
Long Critical
Long Critical
Long High
Long Medium
Medium High
Medium Low
Medium Low
Medium Low

1 Solution

somesoni2
Revered Legend

Try something like this

your search giving above output (two fields) | chart count over Level by Urgency

Select the appropriate option in the visualization to create stacked chart.

View solution in original post

somesoni2
Revered Legend

Try something like this

your search giving above output (two fields) | chart count over Level by Urgency

Select the appropriate option in the visualization to create stacked chart.

jhoang
Path Finder

Thank you brother!!!!

0 Karma

arbelron3
New Member

hey,
I tried and I dont get a graph for each Urgency but a seperated values... it erases some of the points... does someone know why and how I correct it ?

0 Karma

jhoang
Path Finder

Note - this is for year to date data. Is it possible to display this without using the timechart option ?

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...