Splunk Search

How to write a search to get a table of eventstats perc95 and avg by a certain field?

edookati
Path Finder

I need a table which gives me both perc95(response_time) and avg(response_time) by service_name
I am using the below query, but is giving me some weird results...

index=jms_logs sourcetype=perflogs | eventstats perc95(response_time) as response_time_95p, avg(response_time) as avgRespTime | stats by service_name

can someone please help me?
Thanks.

Tags (3)
1 Solution

somesoni2
Revered Legend

Try this

 index=jms_logs sourcetype=perflogs | stats perc95(response_time) as response_time_95p, avg(response_time) as avgRespTime by service_name

View solution in original post

somesoni2
Revered Legend

Try this

 index=jms_logs sourcetype=perflogs | stats perc95(response_time) as response_time_95p, avg(response_time) as avgRespTime by service_name

edookati
Path Finder

thanks. It worked just great.

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...