Splunk Search

timechart with each line defined by multiple fields

benobviate
Explorer

my search is something like

... | stats avg(weight) by color, shape

which results in :

color shape avg(weight)

blue triangle 30

blue circle 20

green triangle 35

I want to do a timechart with each row as a line. I tried replacing stats with timechart but it gave me an error (I'm assuming is because i have it arranged by two fields. How would I go about doing this? I want a line for blue triangle, blue circle and green triangle. Also, is there a convenient way to name the lane via the first+second field name? (e.g. "blue triangle")

Tags (1)
0 Karma
1 Solution

lguinn2
Legend

Sure, try this

yoursearchhere
| eval color_and_shape = color + " " + shape
| timechart avg(weight) by color_and_shape

View solution in original post

lguinn2
Legend

Sure, try this

yoursearchhere
| eval color_and_shape = color + " " + shape
| timechart avg(weight) by color_and_shape

matthewcanty
Communicator

Spot on. Thanks.

0 Karma

benobviate
Explorer

Thank you so much!! That worked perfectly! 🙂

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security: Your Command Center for PCI DSS Compliance

Every security professional knows the drill. The PCI DSS audit is approaching, and suddenly everyone's asking ...

Developer Spotlight with Guilhem Marchand

From Splunk Engineer to Founder: The Journey Behind TrackMe    After spending over 12 years working full time ...

Cisco Catalyst Center Meets Splunk ITSI: From 'Payments Are Down' to Root Cause in ...

The Problem: When Networks and Services Don't Talk Payment systems fail at a retail location. Customers are ...