Splunk Search

graph only cumulative data with timechart and streamstats

bill_bartlett
Path Finder

I've found this on the Splunk wiki that gives great examples on how to graph several sources and their cumulative totals: http://wiki.splunk.com/Community:Search_Report:_How_To_Create_a_Chart_of_Hourly_and_Accumulated_Inde...

Is it possible to use a similar method, but to only graph the cumulative total and not each of the individual sources that make up that total?

0 Karma
1 Solution

somesoni2
Revered Legend

Just add a table/fields command to remove other columns.

Query version from Blogpost

index=_internal group="per_index_thruput" earliest=@d latest=@h
   | eval mb=kb/1024
   | timechart span=1h sum(mb) as HourlyTotal by series
   | addtotals fieldname=HourlyTotal
   | streamstats sum(HourlyTotal) AS AccumulatedTOTAL 
   | table _time AccumulatedTOTAL

Another version

  index=_internal group="per_index_thruput" earliest=@d latest=@h
       | eval mb=kb/1024
       | timechart span=1h sum(mb) as HourlyTotal
       | streamstats sum(HourlyTotal) AS AccumulatedTOTAL 
       | table _time AccumulatedTOTAL

View solution in original post

somesoni2
Revered Legend

Just add a table/fields command to remove other columns.

Query version from Blogpost

index=_internal group="per_index_thruput" earliest=@d latest=@h
   | eval mb=kb/1024
   | timechart span=1h sum(mb) as HourlyTotal by series
   | addtotals fieldname=HourlyTotal
   | streamstats sum(HourlyTotal) AS AccumulatedTOTAL 
   | table _time AccumulatedTOTAL

Another version

  index=_internal group="per_index_thruput" earliest=@d latest=@h
       | eval mb=kb/1024
       | timechart span=1h sum(mb) as HourlyTotal
       | streamstats sum(HourlyTotal) AS AccumulatedTOTAL 
       | table _time AccumulatedTOTAL

bill_bartlett
Path Finder

Thank you, this is almost perfect. Is there a way to format the time bucket on the chart? As it is now, the format makes for a very ugly chart if graphing more than a handful of columns.

0 Karma

bill_bartlett
Path Finder

I've figured it out. This search works perfect for my needs:

index=_internal group="per_index_thruput" earliest=@d latest=@h
    | eval mb=kb/1024
    | timechart span=1h sum(mb) as HourlyTotal by series
    | addtotals fieldname=HourlyTotal
    | streamstats sum(HourlyTotal) AS AccumulatedTOTAL 
    | table _time AccumulatedTOTAL
    | eval _time=strftime(_time, "%m/%d %H:%M")
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Unlocking Unified Insights: New Gigamon Federated Search App for Splunk

In today’s data-heavy environment, organizations are caught in a data distribution dilemma. As data volumes ...

GA: New Data Management App in Splunk Platform

Streamlining Data Management: Introducing a unified experience in Splunk Managing data at scale shouldn’t feel ...

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...