Splunk Search

pie chart

schufi01
Path Finder

Hi,

I got a splunk search that monitors, how many different hosts there were in the chosen timespan. 

| stats dc(host) as hostcount

Now I would like to generate a pie chart, that compares succesful hosts with the unseccesful ones. Therefore I got a field "errors". All hosts with error > 50 should be counted as unseccesful. The others should be counted as succesful. The pie chart should show the succesful/unsuccesful ratio. 

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| makeresults | eval _raw="host  errors
abc              
def      50               
ghi      51
abc      2      
def      50               
ghi      51" | multikv forceheader=1 | fields - _raw _time linecount


| eval unsuccessful = if(errors > 50, "unsuccessful", null)
| stats values(unsuccessful) as unsuccessful by host
| eval status=if(unsuccessful = "unsuccessful","unsuccessful", "successful")
| stats count by status

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| stats sum(errors) as errortotal by host
| eval status=if(errortotal > 50,"unsuccessful", "successful")
| stats count by status
0 Karma

schufi01
Path Finder

Thank you, that already helps. However I did a mistake while explaining my situation. I dont want the sum of errors to be  > 50. If there was one event with error >50 within the timespan, the host should be classified unsuccesful. The sum of errors per host is not important for me. Only if there was one single event with error >50. Do you understand what I mean?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| makeresults | eval _raw="host  errors
abc              
def      50               
ghi      51
abc      2      
def      50               
ghi      51" | multikv forceheader=1 | fields - _raw _time linecount


| eval unsuccessful = if(errors > 50, "unsuccessful", null)
| stats values(unsuccessful) as unsuccessful by host
| eval status=if(unsuccessful = "unsuccessful","unsuccessful", "successful")
| stats count by status
Get Updates on the Splunk Community!

Combine Multiline Logs into a Single Event with SOCK - a Guide for Advanced Users

This article is the continuation of the “Combine multiline logs into a single event with SOCK - a step-by-step ...

Everything Community at .conf24!

You may have seen mention of the .conf Community Zone 'round these parts and found yourself wondering what ...

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...