Splunk Search

timechart with each line defined by multiple fields

benobviate
Explorer

my search is something like

... | stats avg(weight) by color, shape

which results in :

color shape avg(weight)

blue triangle 30

blue circle 20

green triangle 35

I want to do a timechart with each row as a line. I tried replacing stats with timechart but it gave me an error (I'm assuming is because i have it arranged by two fields. How would I go about doing this? I want a line for blue triangle, blue circle and green triangle. Also, is there a convenient way to name the lane via the first+second field name? (e.g. "blue triangle")

Tags (1)
0 Karma
1 Solution

lguinn2
Legend

Sure, try this

yoursearchhere
| eval color_and_shape = color + " " + shape
| timechart avg(weight) by color_and_shape

View solution in original post

lguinn2
Legend

Sure, try this

yoursearchhere
| eval color_and_shape = color + " " + shape
| timechart avg(weight) by color_and_shape

matthewcanty
Communicator

Spot on. Thanks.

0 Karma

benobviate
Explorer

Thank you so much!! That worked perfectly! 🙂

0 Karma
Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...