Splunk Search

How to Build a Chart

Robert11
Path Finder

Hello, the search I am using is below:

Before trying to chart I got 10s of thousands of results, but I would like to create a chart that only displays the below information: "EventCode, EventType, subject, ComputerName, dest, process_exec, process_id"

Why does my original search work but when I try to create chart it doesn't? Everything is done on Windows so Event Code/Types are Windows.  Is anyone able to fix my search so it will pull only the data after chart as well as chart it. Thank you!

 

(Insert Host Name) user="Insert User Name"
| chart EventCode, EventType, subject, ComputerName, dest, process_exec, process_id

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Robert11,

if you want to group you events (that you already displayd in a table) you have to see the following streaming commands:

  • stats
  • chart
  • timechart

you can find all the details and options at https://docs.splunk.com/Documentation/Splunk/9.0.0/SearchReference/WhatsInThisManual

Anyway, if you want to create e.g. a pie chart grouping your events for each of the fields you listed,

you could use something like this (this is an exmple with one of the fields but you can replicate it also for others):

index=wineventlog
| stats count BY EventCode

In  other words, you have to define which is the field to use for grouping events and then use stats.

you can also list the values for the other fields, but always indicating one or more grouping field, e.g. :

index=wineventlog
| stats 
   values(eventType) AS eventType 
   values(subject) AS subject
   values(dest) AS dest 
   values(process_exec) AS process_exec 
   values(process_id) AS process_id 
   count 
   BY ComputerName  EventCode

You can also count the occurrences for two fields. e.g. :

index=wineventlog
| chart count OVER ComputerName BY EventCode

Ciao.

Giuseppe

0 Karma

Robert11
Path Finder

@gcuselloThe commands you posted will they be going after my search that tables the fields I listed or as new searches entirely? I am doing this specifically for one system/user so I cannot have a broad search of winevents or processes etc. that have run in the last 24 hours (<-- example). I have already tabled said fields listed in my original posting but now I would like to chart them into a bar graph with an x/y axis with the fields being across the x-axis and the y-axis being the amount of hits in my desired search period. or if possible (probably complex) if each field can have dedicated graphs for the information within said field. Currently I am looking at a dozen event codes so if there were a dozen individual graphs for each event code under the entire field EventCode that would be extremely helpful in differentiating what data belongs to which field. Thanks!

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Robert11,

in panels you normally display a table with al events, like the one you already used or panels with charts grouping for one or more fields.

So you should use the same search, and, instead using table, use stats or chart for charting, so answering to your question, you have to use stats or chart instead table.

In addition, to avoid to run the same search in many panels, you could explore the opportunity to use the Post Process Search (https://docs.splunk.com/Documentation/Splunk/8.2.6/Viz/Savedsearches#Post-process_searches_2), in few words, you create a base search that you call from each panel.

Ciao.

Giuseppe

0 Karma

Robert11
Path Finder

@gcuselloYes, I did that with the chart command:

(Insert Host Name) user="Insert User Name"
| chart EventCode, EventType, subject, ComputerName, dest, process_exec, process_id

The above search is what I believe you are saying to do? When I use this search it throws an error.

When I do the below search it works and populates a Table correctly:

(Insert Host Name) user="Insert User Name"
| Table EventCode, EventType, subject, ComputerName, dest, process_exec, process_id

So if I use the stats or chart command in place of Table like you are suggesting it will not run properly. Any ideas on why that is? For the sake of your ability to trouble shoot if you put in your computer name and user name (in place of the Insert....) into your own Splunk instance it should display the error I am getting.

 

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Robert11,

please read the documentation for stats and chart: you have to define what is/are the fields used for grouping and then put them in chart or stats command, as I described in my first answer:

in stats, you have to define what you want to do (count, distinct count, sum or average or max or min or values of a field) and then the fiel/s to use or grouping, e.g.:

your search
| stats count BY EventCode ComputerName

 For chart command you have to choose two fieds to use as X and Y axes, e.g.:

your search
| chart count OVER EventCode BY ComputerName

you cannot use chart followed by all the field names.

Ciao.

Giuseppe

0 Karma

fredclown
Builder

That isn't how the chart command works. Are you trying to make a table? is so you would use ...

...your base search
|table field1, field2, field3, field4, etc ...

If you are trying to display a chart what kind of chart are you wanting?

0 Karma

Robert11
Path Finder

Hi @fredclown I did make a table of the events after posting this question. What I am trying to do is build a visual bar graph of each of my requested fields across the x axis and on the y axis have the amount of times said field was triggered/occurred. The search/chart would need to be specific to said computer name/user name that I omitted in my original post. Thanks!

0 Karma
Get Updates on the Splunk Community!

Introduction to Splunk Observability Cloud - Building a Resilient Hybrid Cloud

Introduction to Splunk Observability Cloud - Building a Resilient Hybrid Cloud  In today’s fast-paced digital ...

Observability protocols to know about

Observability protocols define the specifications or formats for collecting, encoding, transporting, and ...

Take Your Breath Away with Splunk Risk-Based Alerting (RBA)

WATCH NOW!The Splunk Guide to Risk-Based Alerting is here to empower your SOC like never before. Join Haylee ...