Splunk Search

Search same string over multiple days on single chart

rdevine
Path Finder

i'm trying to create a chart that has something like this

computername - 7 days ago - 6 days ago - 5 days ago ... etc. for total kb used each day to do some stats on it.

my search string is

index="_internal" source="*metrics.log" per_host_thruput | chart sum(kb) by series useother=false to provide for a single day but i'm not sure how to overlay them all into one chart.

any help would be awesome, thanks!

lguinn2
Legend

Why not use timechart?

index="_internal" source="*metrics.log" per_host_thruput  | timechart useother=false span=1d sum(kb) by series 
0 Karma

rdevine
Path Finder

well ultamitely i'd like to be able to chart each day over ontop of eachother, and also, i'd like to be able to get the top value for each host over the 7 day period.

0 Karma
Get Updates on the Splunk Community!

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...

Brains, Bytes, and Boston: Learn from the Best at .conf25

When you think of Boston, you might picture colonial charm, world-class universities, or even the crack of a ...