Splunk Search

Percentage of search field by day

Mick_OBrien
Path Finder

Hi All

I have a search string ...

index="ee_apigee" vhost="rbs" uri="/eforms/v1.0/cb/*"
| rex "(?i) .*?=\"(?P<httpstatus>\d+)(?=\")"
| bucket _time span=day
| stats count by _time, httpstatus
| eventstats sum(count) as total
| eval percent = (count/total)*100 . " %"
| fields - total

...whose percent field is showing a percentage over entire period searched and not just the 'day'.  How can above be modified to give percentage per day for each httpstatus?

Labels (2)
0 Karma
1 Solution

Mick_OBrien
Path Finder

Found an example and this seems to work...

index="ee_apigee" vhost="rbs" uri="/eforms/v1.0/cb/*"
| rex "(?i) .*?=\"(?P<httpstatus>\d+)(?=\")"
| bucket _time span=day
| stats count by _time, httpstatus
| eventstats sum(count) as totalCount by _time
| eval percentage = round((count/totalCount)*100,3) . " %"
| table _time httpstatus count percentage

View solution in original post

0 Karma

Mick_OBrien
Path Finder

Found an example and this seems to work...

index="ee_apigee" vhost="rbs" uri="/eforms/v1.0/cb/*"
| rex "(?i) .*?=\"(?P<httpstatus>\d+)(?=\")"
| bucket _time span=day
| stats count by _time, httpstatus
| eventstats sum(count) as totalCount by _time
| eval percentage = round((count/totalCount)*100,3) . " %"
| table _time httpstatus count percentage
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...

Customer success is front and center at .conf25

Hi Splunkers, If you are not able to be at .conf25 in person, you can still learn about all the latest news ...

.conf25 Global Broadcast: Don’t Miss a Moment

Hello Splunkers, .conf25 is only a click away.  Not able to make it to .conf25 in person? No worries, you can ...