Splunk Search

Table : line column

LauraBre
Communicator

Hello,
I created a search where I want to create a table including several cases.
My search include this: eval series=case(VE=7,'ok',VE=3,'ko',VE=2,'attempt') | chart count by series,day,hour.
I don t able to have the several case name in column and day and hour in line.

Thx by advance
Laura

Tags (1)
0 Karma

lguinn2
Legend

I don't understand your question, but I see a problem in your case statement:

yoursearchhere |
eval series=case(VE==7,"ok",VE==3,"ko",VE==2,"attempt") | 
chart count by series,day,hour

I assume that day and hour are valid fields for all the events returned by the search? Are you sure that you want a chart and not a timechart? Here is a version that uses the timechart command instead:

yoursearchhere |
eval series=case(VE==7,"ok",VE==3,"ko",VE==2,"attempt") | 
timechart span=1h count by series
0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security: Your Command Center for PCI DSS Compliance

Every security professional knows the drill. The PCI DSS audit is approaching, and suddenly everyone's asking ...

Developer Spotlight with Guilhem Marchand

From Splunk Engineer to Founder: The Journey Behind TrackMe    After spending over 12 years working full time ...

Cisco Catalyst Center Meets Splunk ITSI: From 'Payments Are Down' to Root Cause in ...

The Problem: When Networks and Services Don't Talk Payment systems fail at a retail location. Customers are ...