Splunk Search

timechart with each line defined by multiple fields

benobviate
Explorer

my search is something like

... | stats avg(weight) by color, shape

which results in :

color shape avg(weight)

blue triangle 30

blue circle 20

green triangle 35

I want to do a timechart with each row as a line. I tried replacing stats with timechart but it gave me an error (I'm assuming is because i have it arranged by two fields. How would I go about doing this? I want a line for blue triangle, blue circle and green triangle. Also, is there a convenient way to name the lane via the first+second field name? (e.g. "blue triangle")

Tags (1)
0 Karma
1 Solution

lguinn2
Legend

Sure, try this

yoursearchhere
| eval color_and_shape = color + " " + shape
| timechart avg(weight) by color_and_shape

View solution in original post

lguinn2
Legend

Sure, try this

yoursearchhere
| eval color_and_shape = color + " " + shape
| timechart avg(weight) by color_and_shape

matthewcanty
Communicator

Spot on. Thanks.

0 Karma

benobviate
Explorer

Thank you so much!! That worked perfectly! 🙂

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...