Splunk Search

Counting number of hits in a range

mehuman
New Member

Hi,
I'm trying to count the number of events where a value is over a certain amount as well as within a number of ranges.

Here is my search:

sourcetype=source | rex field=_raw "Java memory percentage: (?<java_mem_percent>.*), OS memory percentage: (?<os_mem_percent>.*)" | rex field=_raw "images was (?<launch_time>.*)" | stats count(eval(java_mem_percent>"90"))

Here is how the data is formatted:

Java memory percentage: 75, OS memory percentage: 64
Java memory percentage: 82, OS memory percentage: 75
Java memory percentage: 34, OS memory percentage: 32
Java memory percentage: 56, OS memory percentage: 79
Java memory percentage: 95, OS memory percentage: 67

Thanks!

Tags (1)
0 Karma

krugger
Communicator

I would say a where would filter out only the events when the memory percentage is above 90:

sourcetype=source | rex field=_raw "Java memory percentage: (?.*), OS memory percentage: (?.*)" | rex field=_raw "images was (?.*)" | where java_mem_percent > 90 | stats count

However what you might want is actually a rangemap:

http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Rangemap

0 Karma

mehuman
New Member

Yes! Rangemap was exactly what I was looking for. Thanks!

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

Your stats count(eval(...)) approach is the correct one, where is it failing?

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...