Hello, fellow Splunkers. 
 I am currently trying to create a stacked timechart column using a simple search query: timechart count by type limit=0  
Since Splunk uses lexicographical ordering by default, I ended up getting an undesired end result.  
 In this particular situation, I have several types(values of the single field) that I would like to display next to each other in the column chart and to do that I have tried assigning a numerical values by using eval/case commands and then sorting the values like this: 
  timechart count by type limit=0 | eval sort_field=case(type="type1",1, type="type2",2, type="type3",3, type="type4",4) | sort sort_field
  
 This approach had no effect whatsoever and no values were changed/re-ordered. As far as I can tell, not even the sort_field was created.I think there is a specific behavior when using this method with timecharts/charts, but I have not yet figured out a working solution. I managed to debug it a little bit further by trying to re-construct the search bit-by-bit and when I removed the timechart: 
  ... | eval sort_field=case(type="type1",1, type="type2",2, type="type3",3, type="type4",4) | sort sort_field
  
 I could see that the field(sort_field) only had 1 value(the first order value):  
   
 I do believe that there is a major syntax error on my part or something else entirely that I don't fundamentally understand yet.   
To sum it up, I am trying to create a column chart showing the count of events based on their type over a period of time. The problem is that the types(chart legend values) are being alphabetically ordered and I would like them to appear in a custom order on the chart.  
Perhaps there is someone with more charting experience willing to lend a helping hand? It would be most appreciated.  
						
					
					... View more