Splunk Search

Why is my chart not displaying all field values?

rkaakaty
Path Finder

Hello,

My chart for some reason, isn't displaying the value "high" and it has the high count at the bottom of the graph when I want the count of the other types under the columns.

Here is my code:

index=nessus
| stats count(eval(risk_factor ="high")) as high count(eval(risk_factor ="medium")) as medium count(eval(risk_factor ="critical")) as critical count(eval(risk_factor ="low")) as low count(eval(risk_factor ="none")) as none 

alt text

0 Karma

DalJeanis
Legend

Try setting the visualization barchart format-

format - general - show data values - on
0 Karma

woodcock
Esteemed Legend

Why not just do this:

index=nessus | stats count BY risk_factor

DalJeanis
Legend

Not the answer to the question he asked, but a great answer nonetheless.

0 Karma
Get Updates on the Splunk Community!

How to send events & findings from AWS to Splunk using Amazon EventBridge

Amazon EventBridge is a serverless service that uses events to connect application components together, making ...

Exciting News: The AppDynamics Community Joins Splunk!

Hello Splunkers,   I’d like to introduce myself—I’m Ryan, the former AppDynamics Community Manager, and I’m ...

The All New Performance Insights for Splunk

Splunk gives you amazing tools to analyze system data and make business-critical decisions, react to issues, ...