Splunk Search

Why am I not seeing any values for fields created with the eval command in my search?

xvxt006
Contributor

I have this search, but I am not seeing any values for Requests:

(status=200 OR status>399) | eval Type=if(status==200,"Good","Bad")  | chart count as requests  over host by Type | rename "requests: Good" as GoodRequests ,"requests: Bad" as Failures   | eval TotalRequests= (GoodRequests+Failures) | eval GoodRequestsPerc = round((GoodRequests/TotalRequests)*100,2) |   eval FailuresPerc = round((Failures/TotalRequests)*100,2)  | table host, GoodRequests,Failures,GoodRequestsPerc,  FailuresPerc | sort  -"FailuresPerc"

I am not seeing any values for GoodRequests, Failures, etc.

Any suggestions?

Tags (2)
0 Karma
1 Solution

xvxt006
Contributor

when i renamed, If i used the same name as i have in the if condition (instead of GoodRequests, used Good& requests: Bad as Bad) i am able to see the stats.

View solution in original post

0 Karma

xvxt006
Contributor

when i renamed, If i used the same name as i have in the if condition (instead of GoodRequests, used Good& requests: Bad as Bad) i am able to see the stats.

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

If this answered your own question then please mark it as accepted.

If not then please explain your question.

Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

  Ready to master Kubernetes and cloud monitoring like the pros?Join Splunk’s Growth Engineering team for an ...

Wrapping Up Cybersecurity Awareness Month

October might be wrapping up, but for Splunk Education, cybersecurity awareness never goes out of season. ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...