Splunk Search

eval query

geekygaurav
Observer

Hello All,

I'm displaying Failures and Delays of some processes running daily, i need to make a dashboard where i have to show the volatility of a process, like if the process is getting failed and delayed for the same execution date i should get volatilty value count as 1. Can anybody help me how to construct a eval query with some condition so if Delay count =1 and Failure count=1 for a particular execution date, the volatility count should come as 1. please help

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Are you looking for something like this?

| eval volatilityCount = if(DelayCount==1 AND FailureCount==1, 1, 0)
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...