Splunk Search

Search same string over multiple days on single chart

rdevine
Path Finder

i'm trying to create a chart that has something like this

computername - 7 days ago - 6 days ago - 5 days ago ... etc. for total kb used each day to do some stats on it.

my search string is

index="_internal" source="*metrics.log" per_host_thruput | chart sum(kb) by series useother=false to provide for a single day but i'm not sure how to overlay them all into one chart.

any help would be awesome, thanks!

lguinn2
Legend

Why not use timechart?

index="_internal" source="*metrics.log" per_host_thruput  | timechart useother=false span=1d sum(kb) by series 
0 Karma

rdevine
Path Finder

well ultamitely i'd like to be able to chart each day over ontop of eachother, and also, i'd like to be able to get the top value for each host over the 7 day period.

0 Karma
Get Updates on the Splunk Community!

Monitoring Postgres with OpenTelemetry

Behind every business-critical application, you’ll find databases. These behind-the-scenes stores power ...

Mastering Synthetic Browser Testing: Pro Tips to Keep Your Web App Running Smoothly

To start, if you're new to synthetic monitoring, I recommend exploring this synthetic monitoring overview. In ...

Splunk Edge Processor | Popular Use Cases to Get Started with Edge Processor

Splunk Edge Processor offers more efficient, flexible data transformation – helping you reduce noise, control ...