Splunk Search

how to limit percent results to 2 decimal places

edookati
Path Finder

I am using the below query to form a table, but the percent values have up to 6 decimal places.
Can you please let me know how to limit them to 2 decimal places?

Query:
index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason

Results:
Reason count percent
Case(s) updated successfully 144 96.000000
Could not update case since Case not found in salesforce 5 3.333333
Case Found but the contact information does not match 1 0.666667

Thanks.

Tags (1)
1 Solution

strive
Influencer

Try this

index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason | eval percent=round(percent,2)

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Isn't the eventstats obsolete in that search?

strive
Influencer

Try this

index=jms_logs osb_Service="CRMCaseService.Services.CRMCaseService" | eventstats count by Reason | top Reason | eval percent=round(percent,2)

edookati
Path Finder

perfect. It worked.

Get Updates on the Splunk Community!

Stay Connected: Your Guide to July and August Tech Talks, Office Hours, and Webinars!

Dive into our sizzling summer lineup for July and August Community Office Hours and Tech Talks. Scroll down to ...

Edge Processor Scaling, Energy & Manufacturing Use Cases, and More New Articles on ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Get More Out of Your Security Practice With a SIEM

Get More Out of Your Security Practice With a SIEMWednesday, July 31, 2024  |  11AM PT / 2PM ETREGISTER ...