<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Show averages for three different types of results in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Show-averages-for-three-different-types-of-results/m-p/102512#M26497</link>
    <description>&lt;P&gt;Hi, have not idea how your base search looks or your raw data, but I would use rex or regex in my search.  I am also assuming CitrixServer is a valid field.  &lt;/P&gt;

&lt;P&gt;I am assuming the following: OAIMFEPV94 - base_servername=OAIMFE, server_type=PV, server_instance=94&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;PRE&gt;&lt;CODE&gt;&lt;BR /&gt;
...| rex field=CitrixServer "(?i)oaimfe(?&amp;lt;server_type&amp;gt;\w+)\d\d$" | stats sum(TotalStartupTime) by server_type&lt;BR /&gt;
&lt;/CODE&gt;&lt;/PRE&gt;&lt;/P&gt;

&lt;P&gt;You can further enrich the data by using a case statment or lookup table. Also read Splunk SPL Cook book which is available for download.&lt;/P&gt;

&lt;P&gt;Hope this helps or gets you started. Don't forget to accept and vote answers that help.&lt;/P&gt;</description>
    <pubDate>Mon, 22 Jul 2013 18:02:16 GMT</pubDate>
    <dc:creator>bmacias84</dc:creator>
    <dc:date>2013-07-22T18:02:16Z</dc:date>
    <item>
      <title>Show averages for three different types of results</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Show-averages-for-three-different-types-of-results/m-p/102511#M26496</link>
      <description>&lt;P&gt;I need to show the difference between three different types of servers for example.&lt;/P&gt;

&lt;P&gt;CitrixServer    TotalStartupTime&lt;BR /&gt;
OAIMFEP06   15.609 &lt;BR /&gt;
OAIMFEPV94  27.876 &lt;BR /&gt;
OAIMFEPT07  17446.984&lt;/P&gt;

&lt;P&gt;Virtual servers have 'v' in the name, test servers have 't' in the name and physical servers have neither T or V in the name.&lt;/P&gt;

&lt;P&gt;I would like to show the average TotalStartupTime for each type of server. &lt;/P&gt;

&lt;P&gt;Thank you SplunkBase!&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;CitrixServer    TotalStartupTime
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;1   OAIMFEPV94  27.876&lt;BR /&gt;
2   OAIMFEPV89  20.095&lt;BR /&gt;
3   OAIMFEPV13  36.08&lt;BR /&gt;
4   oaimfep03   51.654&lt;BR /&gt;
5   OAIMFEP22   779.027&lt;BR /&gt;
6   OAIMFEP02   52.532&lt;BR /&gt;
7   OAIMFEPV83  67.69&lt;BR /&gt;
8   OAIMFEPV80  15.25&lt;BR /&gt;
9   OAIMFEPV40  98.207&lt;BR /&gt;
10  OAIMFEP06   15.609&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2013 12:51:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Show-averages-for-three-different-types-of-results/m-p/102511#M26496</guid>
      <dc:creator>bigtyma</dc:creator>
      <dc:date>2013-07-22T12:51:23Z</dc:date>
    </item>
    <item>
      <title>Re: Show averages for three different types of results</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Show-averages-for-three-different-types-of-results/m-p/102512#M26497</link>
      <description>&lt;P&gt;Hi, have not idea how your base search looks or your raw data, but I would use rex or regex in my search.  I am also assuming CitrixServer is a valid field.  &lt;/P&gt;

&lt;P&gt;I am assuming the following: OAIMFEPV94 - base_servername=OAIMFE, server_type=PV, server_instance=94&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;PRE&gt;&lt;CODE&gt;&lt;BR /&gt;
...| rex field=CitrixServer "(?i)oaimfe(?&amp;lt;server_type&amp;gt;\w+)\d\d$" | stats sum(TotalStartupTime) by server_type&lt;BR /&gt;
&lt;/CODE&gt;&lt;/PRE&gt;&lt;/P&gt;

&lt;P&gt;You can further enrich the data by using a case statment or lookup table. Also read Splunk SPL Cook book which is available for download.&lt;/P&gt;

&lt;P&gt;Hope this helps or gets you started. Don't forget to accept and vote answers that help.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2013 18:02:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Show-averages-for-three-different-types-of-results/m-p/102512#M26497</guid>
      <dc:creator>bmacias84</dc:creator>
      <dc:date>2013-07-22T18:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Show averages for three different types of results</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Show-averages-for-three-different-types-of-results/m-p/102513#M26498</link>
      <description>&lt;P&gt;Nice!&lt;/P&gt;

&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2013 20:31:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Show-averages-for-three-different-types-of-results/m-p/102513#M26498</guid>
      <dc:creator>bigtyma</dc:creator>
      <dc:date>2013-07-23T20:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: Show averages for three different types of results</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Show-averages-for-three-different-types-of-results/m-p/102514#M26499</link>
      <description>&lt;P&gt;If this help dont forget to accept by clicking the the check mark.  Cheers&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2013 20:45:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Show-averages-for-three-different-types-of-results/m-p/102514#M26499</guid>
      <dc:creator>bmacias84</dc:creator>
      <dc:date>2013-07-23T20:45:43Z</dc:date>
    </item>
  </channel>
</rss>

