Splunk Search

Splunk bar chart how can i display percentage and total count

Cheng2Ready
Communicator
index=test   pod=poddy1 "severity"="INFO"    "message"="IamExample*"

| rex field=message "IamExample(?<total>).*"
| rex field=message ".*ACCOUNT<accountreg>.*):"
| rex field=message ".*Login(?<login>.*)"
| rex field=message ".*Profile(?<profile>"
| rex field=message ".*Card(?<card>)"
| rex field=message ".*Online(?<online>) "

| stats count(total) as "Total" count(accountreg) as "Account" count(login) as "Login" count(profile) as "Profile" count(card) as "Card" count(online) as "Online "


Choosing a bar chart to display has "Total" show on the left hand side is there a way remove it?

Cheng2Ready_1-1732903835512.png
also hovering over the chart its showing the count
is there a way to make it display like this example below?

field, count , percentage we want to divide Account , Login , Profile, Online it by Total that we have above 

Cheng2Ready_2-1732903909165.png

 

 

 

 




Labels (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

The Total on the y-axis comes from the first column listed in your results, so replace that with a column with a space for a name

| rex field=message "IamExample(?<total>).*"
| rex field=message ".*ACCOUNT(?<accountreg>.*):"
| rex field=message ".*Login(?<login>.*)"
| rex field=message ".*Profile(?<profile>)"
| rex field=message ".*Card(?<card>)"
| rex field=message ".*Online(?<online>) "

| stats count(total) as "_Total" count(accountreg) as "Account" count(login) as "Login" count(profile) as "Profile" count(card) as "Card" count(online) as "Online"
| foreach *
    [| eval name="<<FIELD>>: ".round(100*<<FIELD>>/_Total, 2)."%"
    | eval {name} = <<FIELD>>]
| table " " Account:* Login:* Profile:* Card:* Online:*

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

The Total on the y-axis comes from the first column listed in your results, so replace that with a column with a space for a name

| rex field=message "IamExample(?<total>).*"
| rex field=message ".*ACCOUNT(?<accountreg>.*):"
| rex field=message ".*Login(?<login>.*)"
| rex field=message ".*Profile(?<profile>)"
| rex field=message ".*Card(?<card>)"
| rex field=message ".*Online(?<online>) "

| stats count(total) as "_Total" count(accountreg) as "Account" count(login) as "Login" count(profile) as "Profile" count(card) as "Card" count(online) as "Online"
| foreach *
    [| eval name="<<FIELD>>: ".round(100*<<FIELD>>/_Total, 2)."%"
    | eval {name} = <<FIELD>>]
| table " " Account:* Login:* Profile:* Card:* Online:*
Get Updates on the Splunk Community!

New Year, New Changes for Splunk Certifications

As we embrace a new year, we’re making a small but important update to the Splunk Certification ...

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...