Splunk Search

Disabling the effect of wildcard in a Query

shabdadev
Engager

Hi All ,

I have this query :

index=no host=los*  sourcetype= plp  (  path=/desktop /pl/* ) OR ( path=/mobile/pl/*   ) |  stats perc95(responseTime) as "95th Perc Response Time" by path

I Want the result to come like this as shown below( coagulated response time for the desktop and mobile separately ) :

Path                                                           95th Perc Response Time
/desktop/pl/*                                            234
/mobile/pl/*                                              2344

But the result is showing all the url's in path section just because i have used a wildcard in that place .

how to modify this query to get the expected the result. ??

Tags (1)
0 Karma
1 Solution

javiergn
Super Champion

Try this instead (NOT TESTED so there might be typos):

index=no host=los*  sourcetype= plp  (path="/desktop/pl/*" OR  path="/mobile/pl/*") 
| eval pathSummary = if(match(path, "/desktop/pl/*"), "/desktop/pl/*", "/mobile/pl/*")
|  stats perc95(responseTime) as "95th Perc Response Time" by pathSummary

The second line groups your paths based on your preferences and then assigns that into a new field that you can use in your stats.

Thanks,
J

View solution in original post

0 Karma

niketn
Legend

Since you have only two paths (or systems) i.e. desktop and mobile in your base search. Following should work:

 index="no" host="los*"  sourcetype="plp"  (  path="/desktop/pl/*" ) OR ( path="/mobile/pl/*"   ) 
| eval path=if(match(path,"desktop"),"desktop","mobile")
| stats perc95(responseTime) as "95th Perc Response Time" by path
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

niketn
Legend

Oh too late. You already got your answer 🙂

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

shabdadev
Engager

hahahha Thanks you Niket too....i guess logic is same in both . Thanks again 🙂

0 Karma

javiergn
Super Champion

Try this instead (NOT TESTED so there might be typos):

index=no host=los*  sourcetype= plp  (path="/desktop/pl/*" OR  path="/mobile/pl/*") 
| eval pathSummary = if(match(path, "/desktop/pl/*"), "/desktop/pl/*", "/mobile/pl/*")
|  stats perc95(responseTime) as "95th Perc Response Time" by pathSummary

The second line groups your paths based on your preferences and then assigns that into a new field that you can use in your stats.

Thanks,
J

0 Karma

shabdadev
Engager

Thanks a lot 🙂 ..it worked

0 Karma

niketn
Legend

@shabdadev, in order to avoid your code from getting escaped, use the code button (101010) while posting your query. Please try to Edit your question and re-post with code button query and sample table.

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

shabdadev
Engager

HI Niket i have modified the post ..please see again

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...