Splunk Search

Calculate percent of missing events

Cuyose
Builder

I swear I have done this before but I want to use the existence of events from a log file to calculate if the service writing them is up.

If I search over last 24 hours and there are events listed up until 12 hours ago, it would be 50% uptime. Problem is that the 12 hours when there are no logs are ignored and I cant remember how to count empty time buckets to make the calculation.

Now obviously I could use a latest if I only ever wanted to calculate things currently down, but I want to be able to sum all the time buckets where logs dont exist to the ones where they do.

0 Karma
1 Solution

Cuyose
Builder

I was able to finally figure out the right search to get what I needed. For any one coming across this, this solved my issue.

https://answers.splunk.com/answers/409513/how-to-edit-my-search-to-calculate-time-availabili.html

View solution in original post

0 Karma

Cuyose
Builder

I was able to finally figure out the right search to get what I needed. For any one coming across this, this solved my issue.

https://answers.splunk.com/answers/409513/how-to-edit-my-search-to-calculate-time-availabili.html

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...