Splunk Search

pie chart

schufi01
Path Finder

Hi,

I got a splunk search that monitors, how many different hosts there were in the chosen timespan. 

| stats dc(host) as hostcount

Now I would like to generate a pie chart, that compares succesful hosts with the unseccesful ones. Therefore I got a field "errors". All hosts with error > 50 should be counted as unseccesful. The others should be counted as succesful. The pie chart should show the succesful/unsuccesful ratio. 

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| makeresults | eval _raw="host  errors
abc              
def      50               
ghi      51
abc      2      
def      50               
ghi      51" | multikv forceheader=1 | fields - _raw _time linecount


| eval unsuccessful = if(errors > 50, "unsuccessful", null)
| stats values(unsuccessful) as unsuccessful by host
| eval status=if(unsuccessful = "unsuccessful","unsuccessful", "successful")
| stats count by status

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| stats sum(errors) as errortotal by host
| eval status=if(errortotal > 50,"unsuccessful", "successful")
| stats count by status
0 Karma

schufi01
Path Finder

Thank you, that already helps. However I did a mistake while explaining my situation. I dont want the sum of errors to be  > 50. If there was one event with error >50 within the timespan, the host should be classified unsuccesful. The sum of errors per host is not important for me. Only if there was one single event with error >50. Do you understand what I mean?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| makeresults | eval _raw="host  errors
abc              
def      50               
ghi      51
abc      2      
def      50               
ghi      51" | multikv forceheader=1 | fields - _raw _time linecount


| eval unsuccessful = if(errors > 50, "unsuccessful", null)
| stats values(unsuccessful) as unsuccessful by host
| eval status=if(unsuccessful = "unsuccessful","unsuccessful", "successful")
| stats count by status
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Now On Demand Whether you're managing complex deployments or looking to future-proof your data ...

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...