I had a issue with Splunk server Availability Query. Can anyone check and correct me?
index=itsisummary kpi="Splunk Agent Availability" NOT "entitytitle=serviceaggregate"
| eval test = replace(alertvalue, "N.A", "1")
| stats sum(test) as off dc(datemday) as day by entitytitle
| eventstats max(day) as maxday
| eval max = maxday1440
| eval server_off = off5
| eval percentoff = (serveroff / max) * 100
| eval percenton = 100 - percentoff
| table entitytitle, percent* day serveroff
| rename entitytitle as Host percentoff as "Unavailability Percentage" percenton as "Availability Percentage" day as "Number of running days" serveroff as "Server Unavailable in Minutes"
Thanks in Advance!!
What results are you getting and what are the expected results?
I didn't find the results. I want to see the results till date. Any changes need to done in query?
It's difficult to determine the correctness of a query without knowing the data being searched as well as the desired output.
There are, however, some problems with the query. Some may be the result of errors entering the query into the question.
table command makes only 4 fields available, but the following
rename command attempts to rename two fields that no longer exist (percentoff, percenton).
The base query is searching for the string "entitytitle=serviceaggregate". Perhaps it intends to search for the field entitytitle containing the value "serviceaggregate" (
The calculation of percent_off is missing a
The field server_off claims to be in minutes, but is multiplied by 5 for no apparent reason.
Please verify the alert_value field contains "N.A" and not "N/A".