Splunk Search

Converting events data into metric using Mcollect

ssharma09
Explorer

Hi Guys,

I'm trying to convert events data into metric for CPU, Disk, Memory monitoring for Azure PAAS, using below command.
index=azure_data metric_name=cpu_percent
| eval metric_name=case(metric_name="cpu_percent", "%_Processor_Time")| eval _value=maximum
| fields host,metric_name,namespace,_time,_value
| eval prefix="Processor." | mcollect index=azure_metrics_summary prefix_field=prefix

*here I'm trying to use mcollect to send CPU data to summary index "azure_metrics_summary ". Query is running with no error but not showing _value field in the output and when I'm running below command to search metrics data , Not seeing any output.

| mstats avg(_value) count where metric_name="Processor.%_Processor_Time" index=azure_metrics_summary by host

Tags (1)
0 Karma

gjanders
SplunkTrust
SplunkTrust

Did you try using the metric explorer or analytics workspace to see if you can find the said metrics?

0 Karma
Get Updates on the Splunk Community!

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

Get Inspired! We’ve Got Validation that Your Hard Work is Paying Off

We love our Splunk Community and want you to feel inspired by all your hard work! Eric Fusilero, our VP of ...

What's New in Splunk Enterprise 9.4: Features to Power Your Digital Resilience

Hey Splunky People! We are excited to share the latest updates in Splunk Enterprise 9.4. In this release we ...