Splunk Search

how to limit percent results to 2 decimal places

edookati
Path Finder

I am using the below query to form a table, but the percent values have up to 6 decimal places.
Can you please let me know how to limit them to 2 decimal places?

Query:
index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason

Results:
Reason count percent
Case(s) updated successfully 144 96.000000
Could not update case since Case not found in salesforce 5 3.333333
Case Found but the contact information does not match 1 0.666667

Thanks.

Tags (1)
1 Solution

strive
Influencer

Try this

index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason | eval percent=round(percent,2)

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Isn't the eventstats obsolete in that search?

strive
Influencer

Try this

index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason | eval percent=round(percent,2)

edookati
Path Finder

perfect. It worked.

Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

 (view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...