Splunk Search

Converting events data into metric using Mcollect

ssharma09
Explorer

Hi Guys,

I'm trying to convert events data into metric for CPU, Disk, Memory monitoring for Azure PAAS, using below command.
index=azure_data metric_name=cpu_percent
| eval metric_name=case(metric_name="cpu_percent", "%_Processor_Time")| eval _value=maximum
| fields host,metric_name,namespace,_time,_value
| eval prefix="Processor." | mcollect index=azure_metrics_summary prefix_field=prefix

*here I'm trying to use mcollect to send CPU data to summary index "azure_metrics_summary ". Query is running with no error but not showing _value field in the output and when I'm running below command to search metrics data , Not seeing any output.

| mstats avg(_value) count where metric_name="Processor.%_Processor_Time" index=azure_metrics_summary by host

Tags (1)
0 Karma

gjanders
SplunkTrust
SplunkTrust

Did you try using the metric explorer or analytics workspace to see if you can find the said metrics?

0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...