Splunk Search

eval query

geekygaurav
Observer

Hello All,

I'm displaying Failures and Delays of some processes running daily, i need to make a dashboard where i have to show the volatility of a process, like if the process is getting failed and delayed for the same execution date i should get volatilty value count as 1. Can anybody help me how to construct a eval query with some condition so if Delay count =1 and Failure count=1 for a particular execution date, the volatility count should come as 1. please help

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Are you looking for something like this?

| eval volatilityCount = if(DelayCount==1 AND FailureCount==1, 1, 0)
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...