<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Show a chart based on host found in another search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277361#M83639</link>
    <description>&lt;P&gt;Suggestion - it's always better to specify the index name. You can see the difference just by adding the index name to your searches.&lt;/P&gt;

&lt;P&gt;Try this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=yourindex sourcetype="search1" [search index=yourindex sourcetype="search1" earliest=-15m internal_time &amp;gt; 250 | stats count(internal_time) as Count by host | where Count &amp;gt; 3 | dedup host| table host] | timechart avg(internal_time) as "Ping Time" by host
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Thu, 21 Jul 2016 16:21:21 GMT</pubDate>
    <dc:creator>somesoni2</dc:creator>
    <dc:date>2016-07-21T16:21:21Z</dc:date>
    <item>
      <title>Show a chart based on host found in another search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277359#M83637</link>
      <description>&lt;P&gt;Ok, So I have two searches that work great.  One will find computers with slow ping times.  The other will create a chart of the ping times based on one host name.  I would like somehow combine these two search's, but not sure how to do it.  I would like my end result to be a chart that shows all the computers with slow ping times on one chart that plots there ping times.&lt;/P&gt;

&lt;P&gt;Here is a search I use to grab the computers I would like to chart.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="search1" earliest=-15m | where internal_time &amp;gt; 250 | stats count(internal_time) as Count by host | where Count &amp;gt; 3 | dedup host| table host,Count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And here is the chart I use to for one computer.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="search1" host=$desktop$ | timechart avg(internal_time) as "Ping Time"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 21 Jul 2016 16:02:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277359#M83637</guid>
      <dc:creator>chadman</dc:creator>
      <dc:date>2016-07-21T16:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: Show a chart based on host found in another search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277360#M83638</link>
      <description>&lt;P&gt;How about this?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="search1" earliest=-60m@m | where internal_time &amp;gt; 250 | bin span=15m _time | stats count(internal_time) as Count avg(internal_time) as "Ping Time" by _time host | where Count &amp;gt; 3
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 21 Jul 2016 16:08:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277360#M83638</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-07-21T16:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Show a chart based on host found in another search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277361#M83639</link>
      <description>&lt;P&gt;Suggestion - it's always better to specify the index name. You can see the difference just by adding the index name to your searches.&lt;/P&gt;

&lt;P&gt;Try this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=yourindex sourcetype="search1" [search index=yourindex sourcetype="search1" earliest=-15m internal_time &amp;gt; 250 | stats count(internal_time) as Count by host | where Count &amp;gt; 3 | dedup host| table host] | timechart avg(internal_time) as "Ping Time" by host
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 21 Jul 2016 16:21:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277361#M83639</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-07-21T16:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: Show a chart based on host found in another search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277362#M83640</link>
      <description>&lt;P&gt;Thanks worked great!&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2016 16:59:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277362#M83640</guid>
      <dc:creator>chadman</dc:creator>
      <dc:date>2016-07-21T16:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: Show a chart based on host found in another search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277363#M83641</link>
      <description>&lt;P&gt;Thanks for the tip!  You solution also did what I was looking for.  I was trying you approach at first, but could not get the syntax correct.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2016 17:13:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277363#M83641</guid>
      <dc:creator>chadman</dc:creator>
      <dc:date>2016-07-21T17:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: Show a chart based on host found in another search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277364#M83642</link>
      <description>&lt;P&gt;Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=blah sourcetype="search1" [index=blah sourcetype="search1" earliest=-15m | where internal_time &amp;gt; 250 | stats count(internal_time) as Count by host | where Count &amp;gt; 3 | dedup host| table host] | timechart avg(internal_time) AS "Ping Time" BY host
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 21 Jul 2016 18:04:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Show-a-chart-based-on-host-found-in-another-search/m-p/277364#M83642</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-07-21T18:04:34Z</dc:date>
    </item>
  </channel>
</rss>

