<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to categorize search results as &amp;quot;good&amp;quot; or &amp;quot;bad&amp;quot; based on values returned? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208005#M60629</link>
    <description>&lt;P&gt;Sure.. it's &lt;A href="mailto:somesh.soni@gmail.com"&gt;somesh.soni@gmail.com&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Sep 2015 18:39:58 GMT</pubDate>
    <dc:creator>somesoni2</dc:creator>
    <dc:date>2015-09-09T18:39:58Z</dc:date>
    <item>
      <title>How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/207996#M60620</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/635i04B27D06EBD3A6DA/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;BR /&gt;
1) In the picture attached, I want to display the values &amp;gt;300 as good and less than 300 as bad&lt;/P&gt;

&lt;P&gt;2) The other part is to calculate the avg of each row (i.e. (calgary+leatherhead+Melbourne)/3) and display a new column with the avg of those, and if the value is &amp;gt;350 it is good and less than 350 as bad&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 14:34:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/207996#M60620</guid>
      <dc:creator>vrmandadi</dc:creator>
      <dc:date>2015-09-09T14:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/207997#M60621</link>
      <description>&lt;P&gt;There is no picture attached. Perhaps you could cut-and-paste the search query. Highlight the text of the search query, then use the &lt;CODE&gt;101010&lt;/CODE&gt; icon to format it as "code" and it will look fine.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 17:54:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/207997#M60621</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2015-09-09T17:54:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/207998#M60622</link>
      <description>&lt;P&gt;can you see the pic now&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 17:56:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/207998#M60622</guid>
      <dc:creator>vrmandadi</dc:creator>
      <dc:date>2015-09-09T17:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/207999#M60623</link>
      <description>&lt;P&gt;What you want to show as in good OR bad? Can you provide sample output you expect?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 18:05:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/207999#M60623</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2015-09-09T18:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208000#M60624</link>
      <description>&lt;P&gt;if the avg of three fields calgary+leatherhead+Melbourne/3 is greater than 300 then the avg value should be displayed and it should fall in good category for example&lt;BR /&gt;
_time                          calgary         houston&lt;BR /&gt;
        2015-09-08           10                     20&lt;BR /&gt;&lt;BR /&gt;
 melbourne     average      status&lt;BR /&gt;
      30                       20             good&lt;/P&gt;

&lt;P&gt;the average of 10+20+30/3=20 &lt;BR /&gt;
since its avg is greater than 10 it is good or else it should be bad&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 18:16:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208000#M60624</guid>
      <dc:creator>vrmandadi</dc:creator>
      <dc:date>2015-09-09T18:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208001#M60625</link>
      <description>&lt;P&gt;One final question, will it be ok for your to fix the span of timechart??&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 18:25:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208001#M60625</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2015-09-09T18:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208002#M60626</link>
      <description>&lt;P&gt;ya so is there anything to do with that&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 18:27:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208002#M60626</guid>
      <dc:creator>vrmandadi</dc:creator>
      <dc:date>2015-09-09T18:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208003#M60627</link>
      <description>&lt;P&gt;Hi somesh if you dont mind can i have your email id..i have seen you have almost 3 yrs exp in splunk as a dev and admin&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 18:31:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208003#M60627</guid>
      <dc:creator>vrmandadi</dc:creator>
      <dc:date>2015-09-09T18:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208004#M60628</link>
      <description>&lt;P&gt;Try something like this (fixed the timechart span to 30 mins in bucket/timechart command)&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=pams ..rest of base search host="ups... rest of host filter | eval duration=(2048/duration)*1000 | bucket span=30m _time | stats avg(duration) as duration by _time hostname | eval sitecode=substr(upper(hostname),1,3) | lookup app_utc_site_lat_long.csv sitecode OUTPUTNEW site | table _time site duration | appendpipe [| stats avg(duration) as duration by _time | eval site="TotalAvg"] | timechart span=30m avg(duration) as duration by site | eval category=if(TotalAvg&amp;gt;300,"Good","Bad") 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 09 Sep 2015 18:39:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208004#M60628</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2015-09-09T18:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208005#M60629</link>
      <description>&lt;P&gt;Sure.. it's &lt;A href="mailto:somesh.soni@gmail.com"&gt;somesh.soni@gmail.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 18:39:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208005#M60629</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2015-09-09T18:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208006#M60630</link>
      <description>&lt;P&gt;Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=pams sourcetype=transaction transaction_status=Success transaction="PAMS 2GiB Read" (host=ups6z4420yh24* OR host=ldn6z442166w6* OR host=cal6z442804vy* OR host=esh6z4419fvaj*) earliest=-1d@d latest=now | eval duration=2048000/duration | eval sitecode=substr(upper(hostname),1,3) | loookup app_utc_site_lat_long.csv sitecode OUTPUTNEW site | timechart avg(duration) by site | addtotals row=t | eval cols=-2 | foreach * [eval cols=cols+1] | eval AllSiteAvg=Total/cols | fields - Total cols | foreach * [eval &amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;_status = if((&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt; &amp;gt; 300), "GOOD", "BAD")] | fields - _time_status
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 09 Sep 2015 18:49:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208006#M60630</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-09-09T18:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208007#M60631</link>
      <description>&lt;P&gt;thank you so much guys&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 19:42:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208007#M60631</guid>
      <dc:creator>vrmandadi</dc:creator>
      <dc:date>2015-09-09T19:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to categorize search results as "good" or "bad" based on values returned?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208008#M60632</link>
      <description>&lt;P&gt;Be sure to close out the question by pickimg the answer that you like the best and clicking "Accept".&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2015 13:28:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-categorize-search-results-as-quot-good-quot-or-quot-bad/m-p/208008#M60632</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-09-10T13:28:29Z</dc:date>
    </item>
  </channel>
</rss>

