Splunk Search

Table and Percentage Calculation from Multiple Searches

splunkbn00bie
Engager

Here is my query - I'm doing two searches that are independent of each other. In both searches, I'm restricting the time to a certain hour and then grouping by day. 

index="first search" | eval date_hour=strftime(_time, "%H") | eval dateday=strftime(_time, "%d") | search date_hour>=10 date_hour<11 | stats count as totalFail by dateday | append [search index="second search" | eval date_hour=strftime(_time, "%H") | search date_hour>=10 date_hour<11 | eval date_day=strftime(_time, "%d") | stats count as totalProcess by date_day | eval failureRate = totalFail/totalProcess] | table dateday, totalFail, totalProcess, failureRate

 

Trying to achieve  two things here: 1) Getting the data to be outputted "correctly" as a table (ie, data is uniform across rows) and 2) Getting a simple calculation (percentage) to work. 

Right now the table is not formatted correctly (ie, 10 rows, instead of 5) and the percentage calculation doesn't appear to be working. 

Here is the desired output:


Day | Fail | Total | Percentage

10 | 1 | 10 | 10%

11 | 2 | 10 | 20%

12| 0| 10| 0%

 

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
index="first search" 
| eval date_hour=strftime(_time, "%H") 
| eval dateday=strftime(_time, "%d") 
| search date_hour>=10 date_hour<11 
| stats count as totalFail by dateday 
| appendcols [search index="second search" 
  | eval date_hour=strftime(_time, "%H") 
  | search date_hour>=10 date_hour<11 
  | eval date_day=strftime(_time, "%d") 
  | stats count as totalProcess by date_day ]
| eval failureRate = totalFail/totalProcess 
| table dateday, totalFail, totalProcess, failureRate

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
index="first search" 
| eval date_hour=strftime(_time, "%H") 
| eval dateday=strftime(_time, "%d") 
| search date_hour>=10 date_hour<11 
| stats count as totalFail by dateday 
| appendcols [search index="second search" 
  | eval date_hour=strftime(_time, "%H") 
  | search date_hour>=10 date_hour<11 
  | eval date_day=strftime(_time, "%d") 
  | stats count as totalProcess by date_day ]
| eval failureRate = totalFail/totalProcess 
| table dateday, totalFail, totalProcess, failureRate
0 Karma

splunkbn00bie
Engager

Thank you, this worked great!

0 Karma
Get Updates on the Splunk Community!

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...

Unlock Instant Security Insights from Amazon S3 with Splunk Cloud — Try Federated ...

Availability: Must be on Splunk Cloud Platform version 10.1.2507.x to view the free trial banner. If you are ...