Splunk Search

how to limit percent results to 2 decimal places

edookati
Path Finder

I am using the below query to form a table, but the percent values have up to 6 decimal places.
Can you please let me know how to limit them to 2 decimal places?

Query:
index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason

Results:
Reason count percent
Case(s) updated successfully 144 96.000000
Could not update case since Case not found in salesforce 5 3.333333
Case Found but the contact information does not match 1 0.666667

Thanks.

Tags (1)
1 Solution

strive
Influencer

Try this

index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason | eval percent=round(percent,2)

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Isn't the eventstats obsolete in that search?

strive
Influencer

Try this

index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason | eval percent=round(percent,2)

edookati
Path Finder

perfect. It worked.

Get Updates on the Splunk Community!

Splunk Cloud | Empowering Splunk Administrators with Admin Config Service (ACS)

Greetings, Splunk Cloud Admins and Splunk enthusiasts! The Admin Configuration Service (ACS) team is excited ...

Tech Talk | One Log to Rule Them All

One log to rule them all: how you can centralize your troubleshooting with Splunk logs We know how important ...

Splunk Security Content for Threat Detection & Response, Q1 Roundup

Join Principal Threat Researcher, Michael Haag, as he walks through: An introduction to the Splunk Threat ...