Splunk Search

Sparkline and Trend Indicator splunk

dchalasani
Path Finder

Hi,

I did Sparkline and Trend Indicator splunk as compared to lastweek.

In the result it showing as 92 means in 2 digit value only it is showing. Actually it has to show in like 9240000 like this.

Can any one please help me with this.

source code

<earliest>-7d</earliest>
      <latest>-60m@m</latest>
      <sampleRatio>1</sampleRatio>
    </search>
    <option name="trendColorInterpretation">standard</option>
    <option name="trendDisplayMode">absolute</option>
    <option name="trendInterval">-1h</option>
    <option name="colorBy">value</option>
    <option name="colorMode">none</option>
    <option name="numberPrecision">0</option>
    <option name="showTrendIndicator">1</option>
    <option name="showSparkline">1</option>
    <option name="useColors">0</option>
    <option name="useThousandSeparators">1</option>
    <option name="underLabel">Compared to lastweek</option>

Thanks

0 Karma
1 Solution

niketn
Legend

Do you want to bucket alert_risk_level in 1 hour window? Use following query instead

index=aws sourcetype=description earliest=-7d 
| timechart span=1h count(alert_risk_level) as Risk_Identified
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

View solution in original post

0 Karma

niketn
Legend

Do you want to bucket alert_risk_level in 1 hour window? Use following query instead

index=aws sourcetype=description earliest=-7d 
| timechart span=1h count(alert_risk_level) as Risk_Identified
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

dchalasani
Path Finder

Thanks Nike!

0 Karma

niketn
Legend

@dchalasani, glad it worked. I have converted to answer. Please Accept Answer to close this question.

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

dchalasani
Path Finder

Ok...and The Trend Indicator is showing very small.. Can we make it big(Trend Indicator) to show in a effective way.

Thanks

0 Karma

niketn
Legend

All single value elements adjust according to the size of panel and amount of data. You can color your single value panel based on trends to make the same obvious. You should be able to Edit Panel and choose these settings from Format menu.

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

dchalasani
Path Finder

And I used string as

index=aws sourcetype=description earliest=-7d | stats count as alert_risk_level by _time | timechart span=60m max(alert_risk_level) | rename max(alert_risk_level) as Risk_Identified

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In the last month, the Splunk Threat Research Team (STRT) has had 1 release of new security content via the ...

There's No Place Like Chrome and the Splunk Platform

Watch On DemandMalware. Risky Extensions. Data Exfiltration. End-users are increasingly reliant on browsers to ...

The Great Resilience Quest: 5th Leaderboard Update

The fifth leaderboard update for The Great Resilience Quest is out &gt;&gt; &#x1f3c6; Check out the ...