- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Create report with totals (pivot or through search query)
Hello all,
So, I am having the following information forwarded to splunk as sourcetype as below (with more than 15000 similar lines):
2021-Jan-14 09:07 2 servername2 instance1 2021-Jan-14 09:07:25.393 [transaction_string1] 79897 67163 OK 1 [269661] 97 28 OK
I don't have any kind of header of this text file that is forwarded to splunk but I do know how to create one using the Fields options - that won't be an issue.
I need to create a report that has the following specs:
1. Rows:
"Scored" - a rangemap for the value which is represented in the text file as 97 (after [269661])
range map should be:
- 0s-to-0.05s=1-50
- 0.05s-to-0.10s=51-100
- 0.10s-to-0.15s=101-150
- 0.15s-to-0.20s=151-200
- 0.20s-to-0.30s=201-300
- 0.30s-to-0.50s=301-500
- 0.50s-to-1s=501-1000
- 1s-to-2s=1001-2000
- 2s-to-3s=2001-3000
- 3s-to-5s=3001-5000
- 5s-to-30s=5001-30000
- >30s=30001-99999
2. Columns:
- All: a sum(count) for each range present - if there are no records for a specific range, then 0 should be shown as a total.
- servername (alphabetically sorted) with instanceId (there are 2: 1 and 2 for each servername) - each one getting the count value for each range value in "Scored" mentioned above ---- if there are is 0 as count for a specific range on the servername and instanceid, then 0 should be shown for each servername and instanceid.
Now, by the looks of it, this can be achieved using a pivot.
So far, this is what I could've come up with:
The output I need should be similar to one below:
Can anyone help me out on how to build up a search query to actually have the desired output?
Thanks!
