Splunk Search

I need to group results based on a threshold

mkwan0
New Member

I am running a query against a webserver access log. I need to group all responses greater than 5 seconds, and determine what percentage of all responses are in the above 5 second group. Any thoughts?

Tags (1)
0 Karma

mkwan0
New Member

Ayn, thanks

I had come up with this
earliest=-y latest=now | timechart count(eval(serve_request_time_sec<5)) As WithinSLA, count(eval(serve_request_time_sec>5)) As OverSLA

Now I just need to divide the OverSLA group by OverSLA+WithinSLA. Is there a way to do that within Stats or Timechart

As you probably guessed, I am fairly new to Splunk, and reading documentation as I go.

0 Karma

Ayn
Legend

You could use stats with eval for this:

... | stats count(eval(response_time>=5)) as slow_response_count
0 Karma
Get Updates on the Splunk Community!

Alpha Launch: AI-Assisted Auto-Schematization for CIM

Streamlining Data Onboarding: Announcing the Alpha Release of AI-Assisted Auto-Schematization For many Splunk ...

Enterprise Security(ES) Essentials or Premier? Let's discuss Splunk ES Editions on ...

  Hi everyone, Last year at .conf25, we shared something exciting: Splunk Enterprise Security is evolving ...

[Puzzles] Solve, Learn, Repeat: Advent of Code - Day 5

Advent of CodeIn order to participate in these challenges, you will need to register with the Advent of Code ...