<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic log volume by host in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/log-volume-by-host/m-p/541078#M153170</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have 26 hosts reporting data to a specific index. These hosts are prone to malfunction at any time &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Is there a search I can do that will show me any dramatic increases in logging volume from any of the hosts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 23 Feb 2021 20:11:20 GMT</pubDate>
    <dc:creator>bgill0123</dc:creator>
    <dc:date>2021-02-23T20:11:20Z</dc:date>
    <item>
      <title>log volume by host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/log-volume-by-host/m-p/541078#M153170</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have 26 hosts reporting data to a specific index. These hosts are prone to malfunction at any time &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Is there a search I can do that will show me any dramatic increases in logging volume from any of the hosts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 20:11:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/log-volume-by-host/m-p/541078#M153170</guid>
      <dc:creator>bgill0123</dc:creator>
      <dc:date>2021-02-23T20:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: log volume by host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/log-volume-by-host/m-p/541206#M153216</link>
      <description>&lt;P&gt;Hi bgill0123,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in order to get an overview of the data ingestion rates by host you can use this example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_internal sourcetype=splunkd fwdType=* group=tcpin_connections(connectionType=cooked OR connectionType=cookedSSL) 
| timechart minspan=30s avg(eval(tcp_KBps)) as "KB/s", avg(tcp_eps) as "Events/s" by hostname&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Additionally if you are using the Monitoring Console you can find desired information here:&lt;BR /&gt;&lt;A href="https://community.splunk.com/" target="_blank"&gt;https://&amp;lt;your_MC&amp;gt;:8000/en-GB/app/splunk_monitoring_console/forwarder_deployment&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;In order to only get the the dramatically increased ingestion-rates you need to define what "dramatic" means.&lt;BR /&gt;If we are going with "double" == "dramatic" then we can run the following example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_internal sourcetype=splunkd "group=tcpin_connections" ("connectionType=cooked" OR "connectionType=cookedSSL")  earliest="-2d@d" latest=@d 
| fields hostname, tcp_KBps
| bin _time span=1h
| stats max(eval(tcp_KBps)) as "max_kbs" by _time, hostname 
| stats avg(max_kbs) as avg_max_kbs latest(max_kbs) as latest_max_kbs by hostname
| eval dramatic_threshold=avg_max_kbs*2
| eval dramatic=if(latest_max_kbs&amp;gt;dramatic_threshold,"true","false")
| where dramatic=="true"&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;This will give you a list of hosts where in the last 1h there was a peak higher than the average peaks in the last 2 days.&lt;/P&gt;&lt;P&gt;This can be modified to calculate the Volume as well.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;-----&lt;BR /&gt;Hope this helps.&lt;BR /&gt;If this answer helped you, please upvote/mark as resolution.&lt;BR /&gt;&lt;BR /&gt;Kind,&lt;BR /&gt;Florian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2021 13:11:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/log-volume-by-host/m-p/541206#M153216</guid>
      <dc:creator>effem2</dc:creator>
      <dc:date>2021-02-24T13:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: log volume by host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/log-volume-by-host/m-p/541227#M153229</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/74891"&gt;@bgill0123&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;The below query will give the total count of events per host every hour for the index. You can select any chart to see the pattern.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count where index="indexname" by host, _time 
| timechart span=1h sum(count) as count by host&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this reply helps you, an upvote/like would be appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2021 14:41:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/log-volume-by-host/m-p/541227#M153229</guid>
      <dc:creator>manjunathmeti</dc:creator>
      <dc:date>2021-02-24T14:41:09Z</dc:date>
    </item>
  </channel>
</rss>

