Splunk Search

Line graph incorrectly shows a flat line

isplunk2999
Path Finder

Hi

I have the following search query which shows the output as shown below,as you can see the issue is the linegraph is a flat one when the values are actually different,can anyone provide guidance what is wrong here and how to fix it?

| makeresults 
 | eval _raw="{
      \"entry\" : [{
       \"Analyze.Count\":\"100\",
       \"Analyze.Screen\":\"100\",
       \"Analyze.Investigate\":\"101\",
       \"Analyze.Review\":\"103\",
       \"_time\": 1556668713
      }, {
       \"Analyze.Count\":\"700\",
       \"Analyze.Screen\":\"800\",
       \"Analyze.Investigate\":\"801\",
       \"Analyze.Review\":\"803\",
       \"_time\": 1556683685
      },{
       \"Analyze.Count\":\"200\",
       \"Analyze.Screen\":\"1000\",
       \"Analyze.Investigate\":\"1001\",
       \"Analyze.Review\":\"1003\",
       \"_time\": 1556683885
      },{
       \"Analyze.Count\":\"50\",
       \"Analyze.Screen\":\"800\",
       \"Analyze.Investigate\":\"801\",
       \"Analyze.Review\":\"803\",
       \"_time\": 1556682885
      }]
  }" 
 | spath 
 | fields - _raw _time 
 | mvexpand entry{}._time 
 | rename entry{}.* as * 
 | timechart min(*) AS * max(*) AS *

CURRENT OUTPUT:-

alt text

0 Karma
1 Solution

efavreau
Motivator

The last line of the query is causing the issue, because the min is named the same as the max. So the results are showing the max for each category. Further, using the * will do all the values at the same time. Not sure what you're looking for over time, but assuming it is, then change the last line to something like:
| timechart min(*) AS min_* max(*) AS max_*
or
| stats min(*) AS min_* max(*) AS max_* BY _time
You'll see the result is now giving you the min and max values per field across all the times. It's still a straight line, as that's the min or max from the data set.

###

If this reply helps you, an upvote would be appreciated.

View solution in original post

0 Karma

efavreau
Motivator

The last line of the query is causing the issue, because the min is named the same as the max. So the results are showing the max for each category. Further, using the * will do all the values at the same time. Not sure what you're looking for over time, but assuming it is, then change the last line to something like:
| timechart min(*) AS min_* max(*) AS max_*
or
| stats min(*) AS min_* max(*) AS max_* BY _time
You'll see the result is now giving you the min and max values per field across all the times. It's still a straight line, as that's the min or max from the data set.

###

If this reply helps you, an upvote would be appreciated.
0 Karma

Sukisen1981
Champion

The chart is giving the correct output. have a look at the statistics tab - values are 700,1001,1003 and 1000 for each occurence of Analyze.Count,Analyze.Screen,Analyze.Investigate and Analyze.Review respectively.
For example analyze count has 3 values all equal to 700 and thats what the blue line is showing - a straight line with all values =700
I suspect your requirement is something else...

0 Karma

isplunk2999
Path Finder

But statistics is also right,look at the values for Analyze.Count,Analyze.Screen,Analyze.Investigate and Analyze.Review over _time ,they are not the same... Anyways I solved this myself

0 Karma

niketn
Legend

@isplunk2999 if you have found a solution to your problem do post the same as answer and accept the same to mark this question as answered and assist others facing similar issue.

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

lakromani
Builder

And how did you solve it?

0 Karma

Sukisen1981
Champion

Hi @isplunk2999 - The stats generated from your above code is gives only the value 700 for analyze count and that is what the line chart is showing, you probably want all the values Analyze.Count,Analyze.Screen,Analyze.Investigate and Analyze.Review IN a single field, in which case you need to modify your code and have the values 700,1001,1003 and 1000 for one single field.
Anyways, since you have figured out what you needed I guess its ok 🙂

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Take Action Automatically on Splunk Alerts with Red Hat Ansible Automation Platform

 Are you ready to revolutionize your IT operations? As digital transformation accelerates, the demand for ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...