Splunk Search

Splunk Query Issue

Chirag812
Explorer
index=abc sourcetype=abc

| timechart span=1m eval(count(IP)) AS TimeTaken

Now I want to get 95th percentile of this total IP counts. like below.

| stats perc95(TimeTaken) as Perc_95 by IP

So how should I write this query ?

Labels (2)
0 Karma

Chirag812
Explorer

Chirag812_0-1716482096284.png

Look like this is worked with this query.

Thank you so much for the quick and useful response.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Chirag812 ,

good for you, see next time!

let me know if I can help you more, or, please, accept one answer for the other people of Community.

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Chirag812 ,

I cannot test it, but it should work:

index=abc sourcetype=abc
| bin span=1m _time
| stats count AS TimeTaken BY IP _time
| timechart perc95(TimeTaken) AS Perc_95 by IP

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...