Splunk Search

How to edit my search to add a trend line to a Splunk line chart?

steveskinner
New Member

Hi,

I'm trying to add a trend line to my splunk line chart, but no trend line is appearing.

Original search string:

(host="pvawbdqt01.xxx.co.uk") index="bluedoor_query_tool_perfmon" source="Perfmon:Processor" counter="% Processor Time" | 
replace "pvawbdqt01.xxx.co.uk" with "pvawbdqt01" in host | 
timechart max(Value) by host

New updated string that's not producing trend line:

(host="pvawbdqt01.xxx.co.uk") index="bluedoor_query_tool_perfmon" source="Perfmon:Processor" counter="% Processor Time" | 
replace "pvawbdqt01.xxx.co.uk" with "pvawbdqt01" in host | 
timechart max(Value) as max_value by host | trendline sma5(max_value) as trend

Can someone please explain how I get the trend line to work please?

0 Karma
1 Solution

somesoni2
Revered Legend

The trendline command applies on a field existing on the result set. In your search, after the timechart command, the available fields are _time and fields with name same as host, so the max_value field doesn't exist and the trendline doesn't work.

Assuming that you're running this search for just one host ("pvawbdqt01.xxx.co.uk" per you search in the question), try something like this

(host="pvawbdqt01.xxx.co.uk") index="bluedoor_query_tool_perfmon" source="Perfmon:Processor" counter="% Processor Time" | 
 replace "pvawbdqt01.xxx.co.uk" with "pvawbdqt01" in host | 
 timechart max(Value) as max_value by host | trendline sma5(pvawbdqt01) as trend

View solution in original post

somesoni2
Revered Legend

The trendline command applies on a field existing on the result set. In your search, after the timechart command, the available fields are _time and fields with name same as host, so the max_value field doesn't exist and the trendline doesn't work.

Assuming that you're running this search for just one host ("pvawbdqt01.xxx.co.uk" per you search in the question), try something like this

(host="pvawbdqt01.xxx.co.uk") index="bluedoor_query_tool_perfmon" source="Perfmon:Processor" counter="% Processor Time" | 
 replace "pvawbdqt01.xxx.co.uk" with "pvawbdqt01" in host | 
 timechart max(Value) as max_value by host | trendline sma5(pvawbdqt01) as trend

steveskinner
New Member

That has done the trick - many thanks for your help on this :O)

0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...