Splunk Search

How to convert seconds to days?

mark_chuman
Path Finder

This search:

index=perfstats host=hostname | chart max(System_Up_Time) as "System Uptime" by host

Outputs a value such as this:

85486.676230500001

Just trying to convert this value in seconds to days.

Thanks. Looked at different posts, but can't seem to convert it effectively.

Labels (2)
Tags (2)
0 Karma

Raja
Engager

perfect

0 Karma

pradeepkumarg
Influencer

All that you need is an eval command to do the math and store in a new field

index=perfstats host=hostname | eval Uptime_Days = System_Up_Time/86400 | chart max(Uptime_Days) as "System Uptime" by host

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

The tostring() takes seconds, you've fed it with days. Pick only one way of conversion, not both at once.

0 Karma

mark_chuman
Path Finder

Tried to ensure I'm not using multiple conversions at once by using these two searches:

index=perfstats host=hostname | eval Uptime_Days = System_Up_Time | chart max(Uptime_Days) as "System Uptime" by host | eval System Uptime = tostring('System Uptime', "duration")

index=perfstats host=hostname | chart max(Uptime_Days) as "System Uptime" by host | eval System Uptime = tostring('System Uptime', "duration")

No data found on both. Just an FYI, no need to reply if you don't want. The initial reply is good.

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

Another neat thing is this after the chart:

... | eval System Uptime = tostring('System Uptime', "duration")

That will provide a readable string with days, hours, minutes, ...

mark_chuman
Path Finder

you mean like this?

index=perfstats host=hostname | eval Uptime_Days = System_Up_Time/86400 | chart max(Uptime_Days) as "System Uptime" by host | eval System Uptime = tostring('System Uptime', "duration")

I get data like this

00:00:17.723748506149999

Thanks

0 Karma

mark_chuman
Path Finder

Thanks very much.

0 Karma

Raja
Engager

Any idea on how to use round function after 17.723748506149999  like 17.72 
when I use round function values no results found.

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Firstly, a golden shovel award 😉 you dug up a thread from 8 years ago 😄

But seriously. If you have a field which looks like a number but doesn't work like a number (nummerical functions don't give you expected results), you're probably dealing with a text field containing string representation of a number. You have to convert it to number first.

| makeresults
| eval stringfield="17.1654923"
| eval bad=round(stringfield,2)
| eval good=round(tonumber(stringfield),2)
0 Karma

somesoni2
Revered Legend

Try like this

| eval System Uptime = tostring(round('System Uptime',2), "duration")
Tags (1)
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...