In the indexer, the search for data returns a timeline and details.
The timeline is always green:
This is fine for queries returning pleasant result.
However, when the query returns unpleasant results, I would like to use red.
You can't change Splunk's user interface - firstly how does Splunk know what "unpleasant" means.
If you want to show a timeline, then create a dashboard and you can do that in the dashboard.
See this documentation
https://docs.splunk.com/Documentation/Splunk/9.0.2/Viz/ChartConfigurationReference
To answer your question: I would like to tell Splunk the color within the search, e.g.:
timeline_bar_color=red index=windows sourcetype=Script:Foo
Searches are all I use of Splunk, creating dashboards is out of my scope.
How can I make a feature request?
Take a look at
However, I suspect you will not get any traction with that, your example is defining colour based on index and sourcetype rather than Splunk deciding on the colour to use, so I am not sure I understand your original distinction between pleasant and unpleasant results and how that is defined.
Anyway, have you looked at event types, where you can define colours for events.
I have not made myself clear: I search for pleasent or unplesant events and would like to color the timeline bar accordingly.
Examples:
timeline_bar_color=green index=windows sourcetype=Script:GoodSearch
timeline_bar_color=green index=windows sourcetype=Script:Searchy SUCCESS
timeline_bar_color=red index=windows sourcetype=Script:BadSearch
timeline_bar_color=red index=windows sourcetype=Script:Searchy FAILURE
Thank you for pointing me to eventtypes, I did not know and just applied them: a red eventtype adds a red column to the details, the timeline still uses green.
I understood, but you can't do what you want to do and it's unlikely to get supported, but by all means create a new idea in that ideas link I posted.