Splunk Search

Multiple sums in one graph

liorfink
Engager

This is a followup question to This.
http://answers.splunk.com/answers/301144/sum-of-new-events-over-time.html

Now further, say I have all these new events, the answer gave me the total for all new events together, which was perfect for that given case.
Now for further analysis, I'd like it to be a line of the total New events, for each Engine.
So with the answer I got this:
alt text

And I would like a different graph of total New events for each Engine, like:
alt text

So to split the results by Engine I got this:

host="MyHost" Status="New" | timechart count by Engine

That gives me a division by Engine, but once again, it shows me single values per day, and not the accumulated total.
I've tried:
host="MyHost" Status="New" | timechart count by Engine | accum count - just adds another value named 'count' with 0

I'm obviously missing something basic in my understanding.
Thanks again in advance!

  • Sorry for my bad editing *
Tags (4)
0 Karma
1 Solution

somesoni2
Revered Legend

Try something like this

host="MyHost" Status="New" | timechart count by Engine | streamstats sum(*) as *

View solution in original post

somesoni2
Revered Legend

Try something like this

host="MyHost" Status="New" | timechart count by Engine | streamstats sum(*) as *

liorfink
Engager

Perfect!
Thank you!

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...