Splunk Search

show fields with no values in a timechart

royimad
Builder

Hello Expert,

I'm showing a multilines graph using this search:

sourcetype="mysource" thefield="x" or thefield="y" or thefield="z" | timechart span=1d count by thefield

The graph is showing 2 lines one for x and one for y because there are no values that is equal to "z".

I need to show 3 lines x,y,z on the graph and consider z as zero.
How to do that?

Tags (1)
0 Karma
1 Solution

royimad
Builder

Try usenull and useother

sourcetype="mysource" thefield="x" or thefield="y" or thefield="z" | timechart span=1d count by thefield usenull=f useother=f

View solution in original post

0 Karma

royimad
Builder

Try usenull and useother

sourcetype="mysource" thefield="x" or thefield="y" or thefield="z" | timechart span=1d count by thefield usenull=f useother=f
0 Karma

kasu_praveen
Communicator

Is this really working? It didn't work for me.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...