Splunk Search

Trouble creating column chart based off 1 event

sam_
Engager

Hi,

I am attempting to create a simple column chart using JSON data from a single event.

The Rows{}.S03PERFC value represents a percent number... I have attempted to convert this but still can't seem to get it to display as a chart.

For some reason the fields are greyed out at the bottom.

Anything obvious I'm missing here?

sam__0-1624608708938.png

 

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

The clue is in the title - you only have one event. You should try expanding the Rows{} collection before extracting the fields within it

| spath output=Rows path=Rows{}
| mvexpand Rows
| spath input=Rows

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

The clue is in the title - you only have one event. You should try expanding the Rows{} collection before extracting the fields within it

| spath output=Rows path=Rows{}
| mvexpand Rows
| spath input=Rows

sam_
Engager

Thanks @ITWhisperer  - that did the trick perfectly!

0 Karma
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...