Splunk Search

Table and Percentage Calculation from Multiple Searches

splunkbn00bie
Engager

Here is my query - I'm doing two searches that are independent of each other. In both searches, I'm restricting the time to a certain hour and then grouping by day. 

index="first search" | eval date_hour=strftime(_time, "%H") | eval dateday=strftime(_time, "%d") | search date_hour>=10 date_hour<11 | stats count as totalFail by dateday | append [search index="second search" | eval date_hour=strftime(_time, "%H") | search date_hour>=10 date_hour<11 | eval date_day=strftime(_time, "%d") | stats count as totalProcess by date_day | eval failureRate = totalFail/totalProcess] | table dateday, totalFail, totalProcess, failureRate

 

Trying to achieve  two things here: 1) Getting the data to be outputted "correctly" as a table (ie, data is uniform across rows) and 2) Getting a simple calculation (percentage) to work. 

Right now the table is not formatted correctly (ie, 10 rows, instead of 5) and the percentage calculation doesn't appear to be working. 

Here is the desired output:


Day | Fail | Total | Percentage

10 | 1 | 10 | 10%

11 | 2 | 10 | 20%

12| 0| 10| 0%

 

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
index="first search" 
| eval date_hour=strftime(_time, "%H") 
| eval dateday=strftime(_time, "%d") 
| search date_hour>=10 date_hour<11 
| stats count as totalFail by dateday 
| appendcols [search index="second search" 
  | eval date_hour=strftime(_time, "%H") 
  | search date_hour>=10 date_hour<11 
  | eval date_day=strftime(_time, "%d") 
  | stats count as totalProcess by date_day ]
| eval failureRate = totalFail/totalProcess 
| table dateday, totalFail, totalProcess, failureRate

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
index="first search" 
| eval date_hour=strftime(_time, "%H") 
| eval dateday=strftime(_time, "%d") 
| search date_hour>=10 date_hour<11 
| stats count as totalFail by dateday 
| appendcols [search index="second search" 
  | eval date_hour=strftime(_time, "%H") 
  | search date_hour>=10 date_hour<11 
  | eval date_day=strftime(_time, "%d") 
  | stats count as totalProcess by date_day ]
| eval failureRate = totalFail/totalProcess 
| table dateday, totalFail, totalProcess, failureRate
0 Karma

splunkbn00bie
Engager

Thank you, this worked great!

0 Karma
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...