Splunk Search

Why is my chart not displaying all field values?

rkaakaty
Path Finder

Hello,

My chart for some reason, isn't displaying the value "high" and it has the high count at the bottom of the graph when I want the count of the other types under the columns.

Here is my code:

index=nessus
| stats count(eval(risk_factor ="high")) as high count(eval(risk_factor ="medium")) as medium count(eval(risk_factor ="critical")) as critical count(eval(risk_factor ="low")) as low count(eval(risk_factor ="none")) as none 

alt text

0 Karma

DalJeanis
Legend

Try setting the visualization barchart format-

format - general - show data values - on
0 Karma

woodcock
Esteemed Legend

Why not just do this:

index=nessus | stats count BY risk_factor

DalJeanis
Legend

Not the answer to the question he asked, but a great answer nonetheless.

0 Karma
Get Updates on the Splunk Community!

Monitoring Postgres with OpenTelemetry

Behind every business-critical application, you’ll find databases. These behind-the-scenes stores power ...

Mastering Synthetic Browser Testing: Pro Tips to Keep Your Web App Running Smoothly

To start, if you're new to synthetic monitoring, I recommend exploring this synthetic monitoring overview. In ...

Splunk Edge Processor | Popular Use Cases to Get Started with Edge Processor

Splunk Edge Processor offers more efficient, flexible data transformation – helping you reduce noise, control ...