Splunk Search

Events per second on a realtime search?

pde23
Explorer

How can I get a count of events per second in a realtime search?

I can do something like this to get a rolling count on a realtime search with a 30 second window:

source=foobar.log host=*prod* PAYLOAD | stats count

But as soon as I add something like |eval eps=max(count/30) it all falls apart and eps doesn't seem to get updated.

For bonus points I'd like to display this in a single value panel with a rangemap...

Thanks

-Pete

Tags (1)
0 Karma

pde23
Explorer

So weird. It didn't work the first two times I tried it, then I walked away for a coffee and it's working as expected. Thanks.

gkanapathy
Splunk Employee
Splunk Employee

Coffee sometimes does that.

gkanapathy
Splunk Employee
Splunk Employee

Seems to work just fine for me:

index=_* OR index=* | stats count | eval eps=count/30

(Note that you don't need max(), but it should give the same results anyway.)

Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...