Splunk Search

pie chart

schufi01
Path Finder

Hi,

I got a splunk search that monitors, how many different hosts there were in the chosen timespan. 

| stats dc(host) as hostcount

Now I would like to generate a pie chart, that compares succesful hosts with the unseccesful ones. Therefore I got a field "errors". All hosts with error > 50 should be counted as unseccesful. The others should be counted as succesful. The pie chart should show the succesful/unsuccesful ratio. 

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| makeresults | eval _raw="host  errors
abc              
def      50               
ghi      51
abc      2      
def      50               
ghi      51" | multikv forceheader=1 | fields - _raw _time linecount


| eval unsuccessful = if(errors > 50, "unsuccessful", null)
| stats values(unsuccessful) as unsuccessful by host
| eval status=if(unsuccessful = "unsuccessful","unsuccessful", "successful")
| stats count by status

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| stats sum(errors) as errortotal by host
| eval status=if(errortotal > 50,"unsuccessful", "successful")
| stats count by status
0 Karma

schufi01
Path Finder

Thank you, that already helps. However I did a mistake while explaining my situation. I dont want the sum of errors to be  > 50. If there was one event with error >50 within the timespan, the host should be classified unsuccesful. The sum of errors per host is not important for me. Only if there was one single event with error >50. Do you understand what I mean?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| makeresults | eval _raw="host  errors
abc              
def      50               
ghi      51
abc      2      
def      50               
ghi      51" | multikv forceheader=1 | fields - _raw _time linecount


| eval unsuccessful = if(errors > 50, "unsuccessful", null)
| stats values(unsuccessful) as unsuccessful by host
| eval status=if(unsuccessful = "unsuccessful","unsuccessful", "successful")
| stats count by status
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...

Share Your Feedback: On Admin Config Service (ACS)!

Help Us Build a Better Admin Config Service Experience (ACS)   We Want Your Feedback on Admin Config Service ...