Splunk Search

how to limit percent results to 2 decimal places

edookati
Path Finder

I am using the below query to form a table, but the percent values have up to 6 decimal places.
Can you please let me know how to limit them to 2 decimal places?

Query:
index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason

Results:
Reason count percent
Case(s) updated successfully 144 96.000000
Could not update case since Case not found in salesforce 5 3.333333
Case Found but the contact information does not match 1 0.666667

Thanks.

Tags (1)
1 Solution

strive
Influencer

Try this

index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason | eval percent=round(percent,2)

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Isn't the eventstats obsolete in that search?

strive
Influencer

Try this

index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason | eval percent=round(percent,2)

edookati
Path Finder

perfect. It worked.

Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...