Splunk Search

Multiple Timecharts by a field in single search

nagpalga
Engager

I wanted to create multiple timecharts in a single search. The scenario i am stuck in is something like this :

index = "A" sourcetype = "B" | where Activity_type = "Activity1" | timechart span=10m count by Event_Type

There are multiple activity_type fields and i want multiple timecharts by Event_Type for different Activity_type in a single search.

Thanks in advance for your help.

Labels (1)

j0e3gan
Explorer

I would like to do the same in a dashboard if possible -- generate a timechart per host in the search results.  Might someone be able to provide some insight here, even point to similar question that has been answered?  Thanks.

0 Karma

tscroggins
Influencer

I've used the trellis option to achieve this. For example:

index=_internal sourcetype=splunkd source=*/splunkd.log*
| bin _time span=10m
| stats count(eval(case(log_level=="ERROR", log_level))) as ERROR count(eval(case(log_level=="WARN", log_level))) as WARN count(eval(case(log_level=="INFO", log_level))) as INFO by _time component

will produce a table of log_level counts by _time and component:

_timecomponentERRORWARNINFO
2021-02-20 11:00AdminManager010
...............

 

In the chart configuration, enable trellis and split by the desired field. I split by component in this example to display counts of events by log_level over time per component.

j0e3gan
Explorer

Trellis options give me a timechart per server using my browser, which is perfect.  Only downside for me is that PDF export does not support trellis options, but this is still a handy approach when PDF export is not a concern.  Thanks!

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

In your dashboard, near the top of the simpleXML, you can have a base search

 

  <search id="base_search">
    <query>index = "A" sourcetype = "B" | timechart span=10m count by Activity_type, Event_Type</query>

 

Then in each dashboard panel, you set the query to be based on your base search with the additional where clause

 

      <chart>
        <search base="base_search">
          <query>| search "Activity1"</query>
        </search> 

 

 

j0e3gan
Explorer

In the dashboard where I tested your suggestion, a base search in the related panel followed by a post-process search in each of the panel's charts works well -- gives me a timechart per server both in my browser and PDF exports.  Only downside is having to know the number of servers to prepare a chart with a post-process search per server, which is not quite as clean as the trellis option mentioned that dynamically produces charts for n servers.  Still, compatibility with PDF exports requires tradeoffs with maintainability in my experience, so this solution is great when I need it.  Thanks!

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Take Action Automatically on Splunk Alerts with Red Hat Ansible Automation Platform

 Are you ready to revolutionize your IT operations? As digital transformation accelerates, the demand for ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...