Splunk Search

How to write a search for a multikv timechart?

sonicZ
Contributor

I have a chart command i've been gathering all the netstat values for a single hour

index=os host=ship*  starttime=10/01/2014:19:00:00 endtime=10/01/2014:19:20:00 sourcetype=netstat | multikv fields State AS netstat_states |  chart count by State, host

Trying to get the equivalent timechart values so I can see when certain states occurred.
here's what i have so far but does not get the actual netstat states, just the count. Looking to get the actual netstat values captured in the timechart as well.

index=os host=ship* sourcetype=netstat | multikv fields State as netstat_states |  timechart span=1h count(netstat_states) by host
Tags (2)
1 Solution

lguinn2
Legend

Try this...

index=os host=ship*  starttime=10/01/2014:19:00:00 endtime=10/01/2014:19:20:00 sourcetype=netstat 
| multikv fields State AS netstat_states 
| eval State_host = State . "+" . host 
| timechart count by State_host

View solution in original post

lguinn2
Legend

Try this...

index=os host=ship*  starttime=10/01/2014:19:00:00 endtime=10/01/2014:19:20:00 sourcetype=netstat 
| multikv fields State AS netstat_states 
| eval State_host = State . "+" . host 
| timechart count by State_host

sonicZ
Contributor

That was it, will be very useful for timecharting other multikv stats, I had to use a limit=0 but got what i needed with your search. Thanks

0 Karma
Get Updates on the Splunk Community!

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...