Dashboards & Visualizations

Sum last count over servers and time chart

n0cturne
Loves-to-Learn

Hello,

I have 5 Servers. Every server has an actual count of user sessions. I want them to sum up, without loosing the trend funcion in the single value chart. 

This is my actual query:

 

 

index=ascrm sourcetype=jmx NumUiSessions=* host IN (z1il0095*,z1il0096*,z1il0097*,z1il0098*)
| stats latest(NumUiSessions) as latest_NumUiSessions by host
| stats sum(latest_NumUiSessions) AS UISessions

 

 

 Could anyone give me a clou?

Best regards

Benjamin

Labels (2)
0 Karma

n0cturne
Loves-to-Learn

I want to trend against the value x hours ago. I have a time picker with token. This time token shoul be used to define x.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Something like this?

index=ascrm sourcetype=jmx NumUiSessions=* host IN (z1il0095*,z1il0096*,z1il0097*,z1il0098*)
| bin _time span=1h
| stats latest(NumUiSessions) as latest_NumUiSessions by host _time
| streamstats sum(latest_NumUiSessions) AS UISessions by _time
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What are you trending against, because you currently only have one value remaining?

0 Karma
Get Updates on the Splunk Community!

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...