Splunk Search

How to chart a percentage from derived search result?

annalwins
Engager

I am new to splunka and have a question on charting percentage field that is derived from search/query result.

Splunk indexed logs:
2013-10-11 17:46:22,539 INFO [com.xxx.yyy] score=891 url_id=200

I would like to chart a % of urls whose score < 100.

I use below query to get list of score count.
host="abc" AND com.xxx.yyy "score" | chart count by score

How can I calculate a percentage of score <100 using splunk?

Tags (1)
0 Karma
1 Solution

somesoni2
Revered Legend

Try below query

host="abc" AND com.xxx.yyy | stats count(eval(score<100)) as CountLess, count as Total by date_hour| eval perc=CountLess*100/Total | fields date_hour,perc

View solution in original post

somesoni2
Revered Legend

Try below query

host="abc" AND com.xxx.yyy | stats count(eval(score<100)) as CountLess, count as Total by date_hour| eval perc=CountLess*100/Total | fields date_hour,perc

Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...