<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Adding multiple sparklines in a search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Adding-multiple-sparklines-in-a-search/m-p/50432#M179558</link>
    <description>&lt;P&gt;I am trying to add multiple sparklines to a search. When I use this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;stats sparkline avg(ProcV) as ProcV  sparkline avg(DiskV) as DiskV  sparkline avg(ProcQueue) as ProcQueue avg(DiskQueue) as DiskQueue avg(ByteT) as ByteT avg(Curcon) as Curcon avg(RWT) as RWT
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;it only shows sparkline for avg(ProcV) but ignoring others. Thats the same when I use chart.&lt;/P&gt;

&lt;P&gt;So I am trying to append the data to the present search results, instead of placing the sparklines for those 3 counters beside the hosts, it creates another set of host fields and then places the saprklines.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| stats avg(ProcV) as ProcV  avg(DiskV) as DiskV   avg(ProcQueue) as ProcQueue avg(DiskQueue) as DiskQueue avg(ByteT) as ByteT avg(Curcon) as Curcon avg(RWT) as RWT
avg(ASP) as ASP avg(ASPv2) as ASPv2 avg(ASPv4) as ASPv4 by host|append [search earliest=-30m@m latest=@m  sourcetype="Perfmon:*" serverType= "B2C WEB APP" counter="% Processor Time" OR counter="Available Kbytes" OR counter="Current Connections"|eventstats avg(Value) as AvgValue by host counter |chart sparkline avg(AvgValue) over host by counter | fields - avg(AvgValue)*|sort - host]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Here is the image on what it does&lt;/P&gt;

&lt;P&gt;&lt;IMG src="http://splunk-base.splunk.com//storage/web.png" alt="alt text" /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 04 Mar 2013 19:53:17 GMT</pubDate>
    <dc:creator>theouhuios</dc:creator>
    <dc:date>2013-03-04T19:53:17Z</dc:date>
    <item>
      <title>Adding multiple sparklines in a search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Adding-multiple-sparklines-in-a-search/m-p/50432#M179558</link>
      <description>&lt;P&gt;I am trying to add multiple sparklines to a search. When I use this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;stats sparkline avg(ProcV) as ProcV  sparkline avg(DiskV) as DiskV  sparkline avg(ProcQueue) as ProcQueue avg(DiskQueue) as DiskQueue avg(ByteT) as ByteT avg(Curcon) as Curcon avg(RWT) as RWT
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;it only shows sparkline for avg(ProcV) but ignoring others. Thats the same when I use chart.&lt;/P&gt;

&lt;P&gt;So I am trying to append the data to the present search results, instead of placing the sparklines for those 3 counters beside the hosts, it creates another set of host fields and then places the saprklines.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| stats avg(ProcV) as ProcV  avg(DiskV) as DiskV   avg(ProcQueue) as ProcQueue avg(DiskQueue) as DiskQueue avg(ByteT) as ByteT avg(Curcon) as Curcon avg(RWT) as RWT
avg(ASP) as ASP avg(ASPv2) as ASPv2 avg(ASPv4) as ASPv4 by host|append [search earliest=-30m@m latest=@m  sourcetype="Perfmon:*" serverType= "B2C WEB APP" counter="% Processor Time" OR counter="Available Kbytes" OR counter="Current Connections"|eventstats avg(Value) as AvgValue by host counter |chart sparkline avg(AvgValue) over host by counter | fields - avg(AvgValue)*|sort - host]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Here is the image on what it does&lt;/P&gt;

&lt;P&gt;&lt;IMG src="http://splunk-base.splunk.com//storage/web.png" alt="alt text" /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2013 19:53:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Adding-multiple-sparklines-in-a-search/m-p/50432#M179558</guid>
      <dc:creator>theouhuios</dc:creator>
      <dc:date>2013-03-04T19:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: Adding multiple sparklines in a search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Adding-multiple-sparklines-in-a-search/m-p/50433#M179559</link>
      <description>&lt;P&gt;Try :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;stats sparkline(avg(ProcV)) as ProcV  sparkline(avg(DiskV)) as DiskV  sparkline)avg(ProcQueue)) as ProcQueue avg(DiskQueue) as DiskQueue avg(ByteT) as ByteT avg(Curcon) as Curcon avg(RWT) as RWT by host
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 04 Mar 2013 21:40:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Adding-multiple-sparklines-in-a-search/m-p/50433#M179559</guid>
      <dc:creator>jonuwz</dc:creator>
      <dc:date>2013-03-04T21:40:11Z</dc:date>
    </item>
  </channel>
</rss>

