Splunk Search

How to show to line chart for failureCount, warningCounttimechart by time?

dezmadi
Path Finder

Hi,

 

I am using below query in my Dashboard

index="deng03-cis-dev-audit" | spath PATH=data.labels.verbose_message output=verbose_message | eval serviceName = mvindex(split(index, "-"), 1)."-".mvindex(split(host, "-"), 2) |search "data.labels.activity_type_name"="ViolationOpenEventv1" | where (verbose_message like "%Oldest unacked message age%evt%" or verbose_message like "%Oldest unacked message age%rec%") | eval error=case(like(verbose_message,"%above the threshold of 1800.000%"), "warning", like(verbose_message,"%above the threshold of 300.000%"), "failure") | stats values(serviceName) as serviceName count(eval(error=="failure")) as failureCount count(eval(error=="warning")) as warningCounttimechart

I want to show to line chart for failureCount, warningCounttimechart by time, I tried appending  timechart span=1d count by failureCount, warningCounttimechart, but of no use

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Try changing

| stats values(serviceName) as serviceName count(eval(error=="failure")) as failureCount count(eval(error=="warning")) as warningCounttimechart

to

| timechart count by error

View solution in original post

dezmadi
Path Finder

Thanks, it works, However I am doing like below

<search id="pubsubLatencyHighAckDelayDFBaseSearch">
<query>index="deng03-cis-dev-audit" | spath PATH=data.labels.verbose_message output=verbose_message | eval serviceName = mvindex(split(index, "-"), 1)."-".mvindex(split(host, "-"), 2) |search "data.labels.activity_type_name"="ViolationOpenEventv1" | where (verbose_message like "%Oldest unacked message age%evt%" or verbose_message like "%Oldest unacked message age%rec%") | eval error=case(like(verbose_message,"%above the threshold of 1800.000%"), "warning", like(verbose_message,"%above the threshold of 300.000%"), "failure")  </query>
<earliest>$time.earliest$</earliest>

Now I want to append a line in below <row>
<panel>
<title>STATS : SLI/SLO Dashboard count</title>
<table>
<search base="pubsubLatencyHighAckDelayDFBaseSearch"></search>

</table>
</panel>
</row>
<latest>$time.latest$</latest>
<sampleRatio>1</sampleRatio>
</search>

How can we append line in <search base="pubsubLatencyHighAckDelayDFBaseSearch"></search>?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try changing

| stats values(serviceName) as serviceName count(eval(error=="failure")) as failureCount count(eval(error=="warning")) as warningCounttimechart

to

| timechart count by error
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...