Splunk Search

Time chart events per index per month but only first n events per month

jonzatlmi
Explorer
| metasearch index="l-hhvm" OR index="l-nginx"
| timechart count as event span=1month by index
| eventstats max(event) as event_count by _time index


I want to get a time based understanding of when these indices have event data, over all time.  But, there is way too many events to count all the way up to the total per month.  I would be happy to just count to 10000 and move on to the next month.

Ideally, count for each month, for each index, up to 10000 (to represent significant data present) all time (could be up to two years).

Sampling won't work becuase there are too many events, it would still take too much time.

what i'm currently getting, would be good to keep this formattingwhat i'm currently getting, would be good to keep this formatting

Labels (2)
0 Karma

yuanliu
SplunkTrust
SplunkTrust

There is a technical answer to this, and there is a viability answer to this.

The technical answer is to limit your search to one month, then use append to add events for additional months, run a top in each search and subsearch, like so

 

index="_*" earliest=-2w@w latest=-1w@w
| top 100 _time by index
| append 
    [search index=_* earliest=-3w@w latest=-2w@w
    | top 100 _time by index
    | table index _time]
| append 
    [search index=_* earliest=-4w@w latest=-3w@w
    | top 100 _time by index
    | table index _time]
| append 
    [search index=_* earliest=-5w@w latest=-4w@w
    | top 100 _time by index
    | table index _time]
| timechart span=1w@w count by index

 

(Instead of month, I use week to speed up testing.). It gives me something like

top-by-month.png

The results can be validated by running a simple timechart, i.e.,

 

index="_*" earliest=-5w@w latest=-1w@w
| timechart span=1w@w count by index

 

by-month-count.png

Does full append-top achieve the goal of saving counts?  The answer is no.  All records for each week (month in your case) are still streamed back.  All the subsearches add overhead.  As a result, append-top uses 35.7s, compared to simple timechart's 32.1s.

So, here is an alternative that will be valid ONLY if your event rate is relatively stable over the sampling period:

 

index="_*" earliest=-1w@w-1d@d latest=-1w@w
| top 100 _time by index
| append 
    [search index=_* earliest=-2w@w-1d@d latest=-2w@w
    | top 100 _time by index
    | table index _time]
| append 
    [search index=_* earliest=-3w@w-1d@d latest=-3w@w
    | top 100 _time by index
    | table index _time]
| append 
    [search index=_* earliest=-4w@w-1d@d latest=-4w@w
    | top 100 _time by index
    | table index _time]
| timechart span=1w@w count by index

 

In this method, only the last day of the week is counted.

by-month-top-partial.png

This search uses 6.9s.  Is this the best solution?  Not really.  It is not only clumsy to setup, but it does rely on a pretty arbitrary assumption about data.

I am not sure why sampling won't work for you, unless your purpose is to accurately count those less populous events.

by-month-sampling.png

If I only want a relative comparison, this serves the purpose and finishes in mere 3.2s.  You can use even looser sampling.

Get Updates on the Splunk Community!

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...