Splunk Search

How can I compare the ratio of errors to 10 minutes ago for all our app_pools?

daniel333
Builder

I would like to get a ratio of errors by app_pool, and then compare it to 5, 10, 1hr ago?

tag=java | 
stats count as "Events" by app_pool | 
appendcols [search 
tag=java tag=problem |
stats count as "Problems" by app_pool]

I am thinking a running summary index counting errors and counting events by app_pool, then a search which compares things after the fact? Is there a better way to do this?

0 Karma

woodcock
Esteemed Legend

You need the timewrap app:

https://splunkbase.splunk.com/app/1645/

0 Karma

sundareshr
Legend

Try this

tag=java earliest=@d | timechart span=1h count as Events count(eval(tag=problem)) as Problems | eval ratio=round(Problems/Events, 2)
0 Karma

daniel333
Builder

Hmm, the evals there don't seem to work. Returning nothing.

0 Karma

sundareshr
Legend

Sorry, problem needs to be in quotes. count(eval(tag="problem"))

0 Karma
Get Updates on the Splunk Community!

Deep Dive into Federated Analytics: Unlocking the Full Power of Your Security Data

In today’s complex digital landscape, security teams face increasing pressure to protect sprawling data across ...

Your summer travels continue with new course releases

Summer in the Northern hemisphere is in full swing, and is often a time to travel and explore. If your summer ...

From Alert to Resolution: How Splunk Observability Helps SREs Navigate Critical ...

It's 3:17 AM, and your phone buzzes with an urgent alert. Wire transfer processing times have spiked, and ...