Dashboards & Visualizations

How to do I combine my two similar searches for my post process dashboard?

joydeep741
Path Finder

I am post processing my dashboard.
I have two searches and I wish to club them into one:

1) index=ABC sourcetype=XYZ | timechart count by websphere_clone_id limit=0

2) index=ABC sourcetype=XYZ HTTPstatus=5* | timechart count by websphere_clone_id limit=0

What condition should I put after the timechart to filter out results with HTTPstatus=5* ? Or is there any other way all together?

0 Karma
1 Solution

sundareshr
Legend

Try this

index=ABC ... | eval h=if(HTTPstatus=5*, 1, 0) | timechart count as total, count(h) as h5 by websphere_clone_id limit=0

View solution in original post

0 Karma

woodcock
Esteemed Legend

Like this:

index=ABC sourcetype=XYZ | timechart count AS total count(eval(like(HTTPstatus, "5%"))) AS h5 BY websphere_clone_id limit=0
0 Karma

sundareshr
Legend

Try this

index=ABC ... | eval h=if(HTTPstatus=5*, 1, 0) | timechart count as total, count(h) as h5 by websphere_clone_id limit=0
0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...