Splunk Search

Single value visualization

orca
Explorer

I understand as per docs single value timechart command is required to put sparkline and trendline. However If I am doing the availability % of my service for example "last 24 hours" and it failed once then my sparkline shows one fall but number always shows as 100% because timechart picks the stats over latest bucket while rendering the number.

Currently in Splunk its like:

Screen Shot 2021-01-07 at 11.19.52 PM.png

 

 

But ideally I would like to show it as 

Screen Shot 2021-01-07 at 11.21.07 PM.png

my search:

index=network sourcetype=nt:logs | stats count(eval('Summary.Error.Code'!="")) as failed_count count as total_count by Test,_time
| eval availability = 100 - ((failed_count/total_count)*100)
| table Test _time availability
| timechart avg(availability) by Test

Any help is appreciated.

Labels (1)
0 Karma
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...