Splunk Search

How to compute Windows service uptime and use those totals to produce an uptime percentage?

pc1234
Explorer

I am trying to determine uptime duration on Windows 7036 events. Below is sample data:

TIME SERVICE STATE
10:00 splunk running
10:03 splunk running
10:04 splunk stopped
10:07 splunk stopped
10:10 splunk stopped
10:15 splunk running
10:16 splunk stopped
10:20 splunk running

I'm trying to compute for a period of time (20 mins here) the total time that a service (Splunk here) is in a running or stopped service state. I will then use those totals to produce an uptime percentage. Any suggestions?

thanks in advance,
Peter

0 Karma

gfreitas
Builder

Hi Peter,

I think you can use the transaction command to accomplish that. First you need to have a field that will identify the values "Splunk running" and "Splunk Stopped", let say this field is called splunk_status. Than you can submit the transaction:

your search | transaction splunk_status | stats sum(duration) AS duration by splunk_status

After this search you will have a table with splunk_status and duration fields. Now you can sum both to find total with the command " | addcoltotals".

Hope this helps

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...