Splunk Search

How to write a search to get a table of eventstats perc95 and avg by a certain field?

edookati
Path Finder

I need a table which gives me both perc95(response_time) and avg(response_time) by service_name
I am using the below query, but is giving me some weird results...

index=jms_logs sourcetype=perflogs | eventstats perc95(response_time) as response_time_95p, avg(response_time) as avgRespTime | stats by service_name

can someone please help me?
Thanks.

Tags (3)
1 Solution

somesoni2
Revered Legend

Try this

 index=jms_logs sourcetype=perflogs | stats perc95(response_time) as response_time_95p, avg(response_time) as avgRespTime by service_name

View solution in original post

somesoni2
Revered Legend

Try this

 index=jms_logs sourcetype=perflogs | stats perc95(response_time) as response_time_95p, avg(response_time) as avgRespTime by service_name

edookati
Path Finder

thanks. It worked just great.

0 Karma
Get Updates on the Splunk Community!

There's No Place Like Chrome and the Splunk Platform

Watch On DemandMalware. Risky Extensions. Data Exfiltration. End-users are increasingly reliant on browsers to ...

The Great Resilience Quest: 5th Leaderboard Update

The fifth leaderboard update for The Great Resilience Quest is out >> 🏆 Check out the ...

Devesh Logendran, Splunk, and the Singapore Cyber Conquest

At this year’s Splunk University, I had the privilege of chatting with Devesh Logendran, one of the winners in ...