Splunk Search

Thruput search help

carmackd
Communicator

I've got a search that will display max daily thruput over the last 30 days.

index="_internal" source="/*/metrics.log" per_index_thruput series="*" daysago=30 | eval gb=kb/1024/1024 | timechart sum(gb) as sumGB | stats max(sumGB) as MaxThru

The output looks like this:

MaxThru
80.0 

I would like the search to include the date, but cannot figure out how to do it using | stats max()

Ideally the output would look like:

Date                      MaxThru
2/4/11 12:00:00.000 AM    80

Any suggestions would be greatly appreciated!

Thanks

Tags (2)
0 Karma
1 Solution

Ayn
Legend

You could achieve what you want by using a combination of sort and head:

index="_internal" source="/*/metrics.log" per_index_thruput series="*" daysago=30 | eval gb=kb/1024/1024 | timechart sum(gb) as sumGB | sort - sumGB | head 1

View solution in original post

Ayn
Legend

You could achieve what you want by using a combination of sort and head:

index="_internal" source="/*/metrics.log" per_index_thruput series="*" daysago=30 | eval gb=kb/1024/1024 | timechart sum(gb) as sumGB | sort - sumGB | head 1

carmackd
Communicator

Perfect! thanks

0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

  Ready to master Kubernetes and cloud monitoring like the pros?Join Splunk’s Growth Engineering team for an ...

Wrapping Up Cybersecurity Awareness Month

October might be wrapping up, but for Splunk Education, cybersecurity awareness never goes out of season. ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...