Splunk Search

Using a stats avg function after an eval case command to categorise

ebs
Communicator

Hi,

I have a requirement where we need to categorise events based on the url into 4 separate categories, then calculate the average response time for each category. Finally we want to display all the averages by category together in a stats table, is there an easy way to do this?

Labels (3)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @ebs,

the problem is to find a rule to categorize urls, if e.g. you have this rule:

in the uri field you have

localhost/* --> Cat. A

community/* --> Cat. B

splunk.com/ --> Cat. C

others--> Cat. D

you can try something like this:

index=your_index
| eventstats count As total
| eval type="D"
| eval type=case(match(uri,"localhost"),"A",match(uri,"community"),"B", match(uri,"splunk.com"),"C")
| stats avg(response_time) AS response_time count values(total) AS total BY type
| eval perc=round(count/total*100,2)
| table type response_time perc

Ciao.

Giuseppe

 

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi @ebs,

the problem is to find a rule to categorize urls, if e.g. you have this rule:

in the uri field you have

localhost/* --> Cat. A

community/* --> Cat. B

splunk.com/ --> Cat. C

others--> Cat. D

you can try something like this:

index=your_index
| eventstats count As total
| eval type="D"
| eval type=case(match(uri,"localhost"),"A",match(uri,"community"),"B", match(uri,"splunk.com"),"C")
| stats avg(response_time) AS response_time count values(total) AS total BY type
| eval perc=round(count/total*100,2)
| table type response_time perc

Ciao.

Giuseppe

 

gcusello
SplunkTrust
SplunkTrust

Hi @ebs,

good for you, see next time!
Ciao and happy splunking.

Giuseppe

P.S.: Karma Points are appreciated :winking_face:

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...