Splunk Search

How to get stats by hour and calculate percentage for each hour?

bijodev1
Communicator

Hi There,

I am trying to get the an hourly stats for each status code and get the percentage for each hour per status. Not sure how to get it.

my search | 
| bucket _time span=1h
| stats count by _time http_status_code
| eventstats sum(count) as totalCount | eval percentage=round((count/totalCount),3)*100

please suggest which command could be helpful here. 

thanks

Labels (4)
Tags (3)
0 Karma
1 Solution

somesoni2
Revered Legend

Give this a try

my_search
| bucket _time span=1h
| stats count BY _time http_status_code
| eventstats sum(count) as totalCount by _time
| eval percentage=round((count/totalCount),3)*100
| table _time http_status_code count percentage

View solution in original post

bijodev1
Communicator

@somesoni2 thank you for the help, it worked.

0 Karma

somesoni2
Revered Legend

Give this a try

my_search
| bucket _time span=1h
| stats count BY _time http_status_code
| eventstats sum(count) as totalCount by _time
| eval percentage=round((count/totalCount),3)*100
| table _time http_status_code count percentage

gcusello
SplunkTrust
SplunkTrust

Hi @bijodev1,

please try this:

my_search
| eventstats sum(count) as totalCount 
| bucket _time span=1h
| stats values(totalCount) AS totalCount count BY _time http_status_code
| eval percentage=round((count/totalCount),3)*100

Ciao.

Giuseppe

0 Karma

bijodev1
Communicator

what I am basically looking for here is 

_time                                 status                           count                                percentage

12:30.                                 100                                 400.                                        30

12:30                                  200                                 600                                         60

12:30                                  300                                 400                                         30

01:30                                  100                                  100                                         10

01:30                                  200                                  400                                          45

01:30                                  300                                  400                                          45

 

like wise

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @bijodev1,

please try this:

my_search
| eventstats count as totalCount 
| bucket _time span=1h
| stats values(totalCount) AS totalCount count BY _time http_status_code
| eval percentage=round((count/totalCount),3)*100

Ciao.

Giuseppe

0 Karma

bijodev1
Communicator

Hi @gcusello 

thank you for the response, but didn't got me any output. 

It doesn't show the percentage and total count per hour

0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...