<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to get 90% of max execution time in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/how-to-get-90-of-max-execution-time/m-p/625218#M217340</link>
    <description>&lt;P&gt;Not sure how to interpret "&lt;SPAN&gt;take 10% record counts and neglect those number of records to get 90% of max Time." So, I have make a blind guess: you want to count events whose Execution_Time is above 90% of maximum time. &amp;nbsp;If so, &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Eventstats" target="_blank" rel="noopener"&gt;eventstats&lt;/A&gt; is your friend.&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| eventstats max(Execution_Time) as maxtime ``` max over entire search period ```
| where Execution_Time &amp;gt; 0.9 * maxtime
| stats count by Hour ``` assuming a field named Hour exists ```&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 25 Dec 2022 04:31:44 GMT</pubDate>
    <dc:creator>yuanliu</dc:creator>
    <dc:date>2022-12-25T04:31:44Z</dc:date>
    <item>
      <title>how to get 90% of max execution time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-get-90-of-max-execution-time/m-p/625167#M217321</link>
      <description>&lt;P&gt;I have a requirement to pull 90% of max execution time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ex: I have 10 requests for an hour and it's execution times as below. Out of which if I take max(Executation_time) I will get 10 sec but I want to give 10% leverage and consider max Time from 90% of ExecutionTimes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will be getting total number of executation details(10 in this ex) through a seach like `stats count(_raw) by Hour'. Now I have to take 10% record counts and neglect those number of records to get 90% of max Time&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tra. Executation_Time&lt;/P&gt;&lt;P&gt;1. 10 Sec&lt;/P&gt;&lt;P&gt;2. 9 Sec&lt;/P&gt;&lt;P&gt;3. 8 sec&lt;/P&gt;&lt;P&gt;4. 7 sec&lt;/P&gt;&lt;P&gt;5. 6 sec&lt;/P&gt;&lt;P&gt;6. 5sec&lt;/P&gt;&lt;P&gt;7. 4 sec&lt;/P&gt;&lt;P&gt;8. 3 sec&lt;/P&gt;&lt;P&gt;9. 2 sec&lt;/P&gt;&lt;P&gt;10. 1 sec&lt;/P&gt;</description>
      <pubDate>Fri, 23 Dec 2022 08:13:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-get-90-of-max-execution-time/m-p/625167#M217321</guid>
      <dc:creator>avadhutha</dc:creator>
      <dc:date>2022-12-23T08:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: how to get 90% of max execution time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-get-90-of-max-execution-time/m-p/625218#M217340</link>
      <description>&lt;P&gt;Not sure how to interpret "&lt;SPAN&gt;take 10% record counts and neglect those number of records to get 90% of max Time." So, I have make a blind guess: you want to count events whose Execution_Time is above 90% of maximum time. &amp;nbsp;If so, &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Eventstats" target="_blank" rel="noopener"&gt;eventstats&lt;/A&gt; is your friend.&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| eventstats max(Execution_Time) as maxtime ``` max over entire search period ```
| where Execution_Time &amp;gt; 0.9 * maxtime
| stats count by Hour ``` assuming a field named Hour exists ```&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Dec 2022 04:31:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-get-90-of-max-execution-time/m-p/625218#M217340</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2022-12-25T04:31:44Z</dc:date>
    </item>
  </channel>
</rss>

