Splunk Search

Splunk Query Issue

Chirag812
Explorer
index=abc sourcetype=abc

| timechart span=1m eval(count(IP)) AS TimeTaken

Now I want to get 95th percentile of this total IP counts. like below.

| stats perc95(TimeTaken) as Perc_95 by IP

So how should I write this query ?

Labels (2)
0 Karma

Chirag812
Explorer

Chirag812_0-1716482096284.png

Look like this is worked with this query.

Thank you so much for the quick and useful response.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Chirag812 ,

good for you, see next time!

let me know if I can help you more, or, please, accept one answer for the other people of Community.

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Chirag812 ,

I cannot test it, but it should work:

index=abc sourcetype=abc
| bin span=1m _time
| stats count AS TimeTaken BY IP _time
| timechart perc95(TimeTaken) AS Perc_95 by IP

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

See Splunk Platform & Observability Innovations at Cisco Live EMEA

Hi Splunkers, Learn about what’s next for Splunk Platform at Cisco Live EMEA.  Data silos are a big challenge ...

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...