Splunk Search

Perfmon Timechart - Multiple Series, Multiple Host

seanp
Path Finder

I have been struggling to find the proper syntax for this type of timechart. This relates to creating a Windows PerfMon graph for multiple series (in the same counter) and multiple host to be able to easily compare. For example, I can graph Bytes Received/sec and Bytes Sent/sec with a simple search like:

index=MyIndex object="Network Interface" | timechart span=30min avg(Value) by counter

This provides gives the total for both host. Now I want to essentially add by host to the end of by counter. Any thoughts? Is this a multi-valued field???

Tags (2)
0 Karma

somesoni2
Revered Legend

Give this a try

index=MyIndex object="Network Interface" |bucket _time span=30m | eval host=_time."##".host|chart avg(Value) over host by counter | rex field=host "(?<_time>.*)##(?<host>.*)"
0 Karma

linu1988
Champion

Try Chart instead of timechart

|bucket _time span=30m|chart avg(Value) by _time,counter,host

|bucket _time span=30m|chart avg(Value) over host by counter

have not tried it myself but this is the way to go. Check out chart overlay in the documentation

Thanks,
L

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Maximizing the Value of Splunk ES 8.x

Splunk Enterprise Security (ES) continues to be a leader in the Gartner Magic Quadrant, reflecting its pivotal ...