Splunk Search

Converting events data into metric using Mcollect

ssharma09
Explorer

Hi Guys,

I'm trying to convert events data into metric for CPU, Disk, Memory monitoring for Azure PAAS, using below command.
index=azure_data metric_name=cpu_percent
| eval metric_name=case(metric_name="cpu_percent", "%_Processor_Time")| eval _value=maximum
| fields host,metric_name,namespace,_time,_value
| eval prefix="Processor." | mcollect index=azure_metrics_summary prefix_field=prefix

*here I'm trying to use mcollect to send CPU data to summary index "azure_metrics_summary ". Query is running with no error but not showing _value field in the output and when I'm running below command to search metrics data , Not seeing any output.

| mstats avg(_value) count where metric_name="Processor.%_Processor_Time" index=azure_metrics_summary by host

Tags (1)
0 Karma

gjanders
SplunkTrust
SplunkTrust

Did you try using the metric explorer or analytics workspace to see if you can find the said metrics?

0 Karma
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...