Splunk Search

How to create a chart with static values from log file?

ketanadkar1
New Member

Hi

I have extracted 2 fields from log file & now I have to show a chart based on these 2 values. How can I do that? The value of these fields will be derived from the log file.

Field 1 - Process name
Field 2 - process count.

I need to show a chart which shows count of each process by host.
As of now I am using the table command to show a table but I want a chart. Any help is much appreciated.

Search:

index=* sourcetype=* | rex field=proc_monitor "\-\s(?(.*))count" |rex field=proc_monitor "count\s\:(?(.*))\;" | where proc_name NOT NULL|rename proc_name as "Process Name"|rename proc_count as "Total Count"|table host "Process Name" "Total Count" 

Log sample:

  • RTP count : 1 ; Status: UP
  • abc count : 16 ; Status: UP
  • def count : 26 ; Status: UP
  • ghi count : 13 ; Status: UP
0 Karma

sundareshr
Legend

Try this

 index=* sourcetype=* | rex field=proc_monitor "\-\s(?(.*))count" |rex field=proc_monitor "count\s\:(?(.*))\;" | where proc_name NOT NULL|rename proc_name as "Process Name"|rename proc_count as "Total Count"| chart sum(proc_count) as "Total Count" over host by "Process Name" 
0 Karma

ketanadkar1
New Member

Thanks for the reply however this is not working.... its showing me no results found.

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...