Activity Feed
- Posted How to show same data for different timezones in single timechart ? on Splunk Search. 06-15-2022 03:00 AM
- Posted Re: How to compare the columns values against another column on Splunk Search. 03-01-2022 09:39 AM
- Karma Re: How to compare the columns values against another column for venky1544. 03-01-2022 09:38 AM
- Posted Re: How to compare the columns values against another column on Splunk Search. 03-01-2022 09:36 AM
- Posted Re: How to compare the columns values against another column on Splunk Search. 03-01-2022 09:29 AM
- Posted How to compare the columns values against another column on Splunk Search. 03-01-2022 06:17 AM
- Posted How to plot a barchart based on String rather than numbers on Dashboards & Visualizations. 08-09-2021 09:41 AM
- Posted How to search for last 6 months for event indexed every month? on Splunk Search. 07-23-2021 01:15 AM
- Posted Re: Invalid Date using Job in the UI on Dashboards & Visualizations. 07-19-2021 11:21 PM
- Karma Re: Invalid Date using Job in the UI for kamlesh_vaghela. 07-19-2021 11:20 PM
- Posted Re: Invalid Date using Job in the UI on Dashboards & Visualizations. 07-19-2021 04:21 AM
- Posted Re: Invalid Date using Job in the UI on Dashboards & Visualizations. 07-19-2021 04:20 AM
- Posted Invalid Date using Job in the UI on Dashboards & Visualizations. 07-19-2021 12:40 AM
- Karma Re: How to avoid un-responsive dropdown input with 100K or more results using Simple XML for niketn. 05-26-2021 10:38 PM
- Posted How to compare last column with previously violated column under foreach? on Splunk Search. 05-26-2021 06:32 AM
- Posted Re: How to get the latest violator value and its month and the number of times it has violated on Splunk Search. 12-03-2020 12:29 AM
- Posted How to get the latest violator value and its month and the number of times it has violated on Splunk Search. 12-02-2020 02:45 AM
- Posted Re: How to get the Max out of row and field name of the max value on Splunk Search. 11-30-2020 09:56 PM
- Posted How to get the Max out of row and field name of the max value on Splunk Search. 11-30-2020 03:13 AM
- Got Karma for Re: How to pass earliest and latest based on week number under drilldown. 09-04-2020 09:25 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
08-21-2018
11:36 PM
@niketnilay I am trying to filter out few IPs by finding the location, but yea this sounds good for now. Thanks
... View more
08-21-2018
11:35 PM
@inventsekar I am not sure on that. Have to check with Ops team since i dont have the permission. But we got upgraded our Splunk recently. So ideally shouldnt it be up-to-date ?
... View more
08-21-2018
11:33 PM
yes i do get.
... View more
08-21-2018
11:04 PM
Hi,
With the below query i am able to list the country and request count by response time split.
wall_time != NULL client_ipaddress != NULL |iplocation client_ipaddress| eval Latency=case(wall_time<500, "0-0.5s", wall_time>=500 AND wall_time<1000, "0.5s-1s",wall_time>=1000 AND wall_time<3000, "1s-3s", wall_time>=3000 AND wall_time<6000, "3s-6s",THREAD_WALL_MS>=4000 AND wall_time<10000, "6s-10s",wall_time>=10000 AND wall_time<30000, "10s-30s", wall_time>=30000, ">=30s")| chart span=1w count as RequestCount over Country by Latency | sort -RequestCount, -Latency
But the query seems to be resulting 1 row with no value for the country field. Why is it so ? Anything i am missing out ?
... View more
- Tags:
- splunk-enterprise
08-21-2018
12:29 AM
@renjith.nair This would work to display by Country. Thanks. But Is it possible to display using Chart command ?
index=data | eval wall_time = round(wall_time/1000,2) | eval Latency=case(wall_time<500, "0-0.5s", wall_time>=500 AND wall_time<1000, "0.5s-1s",wall_time>=1000 AND wall_time<3000, "1s-3s", wall_time>=3000 AND wall_time<6000, "3s-6s",wall_time>=4000 AND wall_time<10000, "6s-10s",wall_time>=10000 AND wall_time<30000, "10s-30s", wall_time>=30000, ">=30s")
| iplocation client_ipaddress |fields requestcount,Country | eval requestcount=1 | chart per_second(requestcount) AS RequestPerSec over Country by Latency
Looks like Chart command doesnt allow per_second. Is there a way to display something like below
Country | 0-0.5s | 0.5s-1s | 1s-3s | 3s-6s | 6s-10s | 10s-30s | >30s
India | 3 | 5 | 6| 7 | 7|5 |1 |0
... View more
08-20-2018
11:44 PM
ok looks like the result is correct, it is just that it displays the _time as start date of the week. It is working.
But could someone tell me how i can get the data indexed for previous week, and compare it with current week ? I am not sure how i have to index.
Should i use Stats command to index the previous week data ? Or do a timechart and index previous week data ? how do i compare with current weeks data. Its bit confusing for me. appreciate if someone could help me on this.
... View more
08-20-2018
11:05 PM
Hi,
I have a query which should ideally give me results for the Last week and the current week Request count.
index=data earliest=-1w@w latest=now | eval Latency=case(walltime<500, "0-0.5s", walltime>=500 AND walltime<1000, "0.5s-1s",walltime>=1000 AND walltime<3000, "1s-3s", walltime>=3000 AND walltime<6000, "3s-6s",walltime>=4000 AND walltime<10000, "6s-10s",walltime>=10000 AND walltime<30000, "10s-30s", walltime>=30000, ">=30s")| timechart span=1w count as RequestCount by Latency
When represented in a single value, it should result me single value of current week along with trendline compared with previous week. But the above query results for both previous week & latest week not the recent 3 days in current week, which is wrong. Here is the preview of the result
How do i represent only the current week's result value alone displayed compared with previous week to show how much in percent less/more the count is ?
Also is it possible to schedule this as a search and have it indexed in summary index. For example, Say every week, i run a query to get that week's result in the name "Previous_week", how do i compare with current week result with the summarized result under the source "Previous_week" ?
... View more
- Tags:
- splunk-enterprise
08-17-2018
10:30 AM
Hi
I have a query which would list me avg, max & P95 requestpersec for the selected time range
index=test client_ipaddress=* |eval requestcount=1 | timechart per_second(requestcount) AS RequestPerSec
| eventstats max(RequestPerSec) as peakRequestPerSec
| eval peakTime=if(peakRequestPerSec==RequestPerSec,_time,null())
| timechart span=1m avg(RequestPerSec) as avgRequestPerSec max(RequestPerSec) as peakRequestPerSec p95(RequestPerSec) as p95RequestPerSec
| fieldformat peakTime=strftime(peakTime,"%m/%y %H:%M") | eval avgRequestPerSec=round(avgRequestPerSec,2) | eval peakRequestPerSec=round(peakRequestPerSec,2)| eval p95RequestPerSec=round(p95RequestPerSec,2)|rename avgRequestPerSec as "Average Requests/Sec" peakRequestPerSec as "Max Requests/Sec" p95RequestPerSec as "P95 Requests/Sec"
The question here is, Can i show Requestpersec by country using the field client_ipaddress present in the events ? How do i do that ? Please let me know
... View more
- Tags:
- splunk-enterprise
08-17-2018
07:10 AM
Hi,
I have a dashboard with multiselect input,
<fieldset submitButton="false" autoRun="true">
<input type="multiselect" token="metric" searchWhenChanged="true">
<label>Metric</label>
<choice value="show_latency">Latency</choice>
<choice value="show_throughput">Throughput</choice>
<choice value="show_error">Error</choice>
<choice value="*">All</choice>
<delimiter> </delimiter>
<change>
<condition label="Latency">
<set token="show_latency">true</set>
<unset token="show_throughput"></unset>
<unset token="show_error"></unset>
</condition>
<condition label="Throughput">
<unset token="show_latency"></unset>
<set token="show_throughput">true</set>
<unset token="show_error"></unset>
</condition>
<condition label="Error">
<unset token="show_latency"></unset>
<unset token="show_throughput"></unset>
<set token="show_error">true</set>
</condition>
<condition label="All">
<set token="show_latency">true</set>
<set token="show_throughput">true</set>
<set token="show_error">true</set>
</condition>
<condition match="isnull(value)">
<unset token="latency"></unset>
<unset token="throughput"></unset>
<unset token="error"></unset>
</condition>
</change>
</input>
</fieldset>
<row>
<panel depends="$show_latency$">
</panel>
<panel depends="$show_latency$">
</panel>
</row>
<row>
<panel depends="$show_throughput$">
</panel>
<panel depends="$show_throughput$">
</panel>
</row>
The probelm here is if i select Latency first, the panels of Latency gets selected. If I select Throughput first and Latency - second , Latency doesnt get displayed.
Could someone please help me out here
... View more
- Tags:
- splunk-enterprise
08-10-2018
12:34 AM
can i have the total count also displayed for each date?
... View more
08-09-2018
03:47 AM
index=sample | eval Latency=case(walltime<500, "0-0.5s", walltime>=500 AND walltime<1000, "0.5s-1s", walltime>=1000 AND walltime<3000, "1s-3s", walltime>=3000 AND walltime<6000, "3s-6s", walltime>=4000 AND walltime<10000, "6s-10s", walltime>=10000 AND walltime<30000, "10s-30s", walltime>=30000, ">=30s") |eval Date =strftime(_time,"%d/%m/%Y") | chart count as RequestCount over Date by Latency
The above query gives me in below format
Date | 0-0.5s | 0.5s-1s | 1s-3s | 3s-6s | 6s-10s | 10s-30s
08/08/2018 | 12350 | 20095 | 5530 | 563 | 170 |120
09/08/2018 | 15350 | 10455 | 3430 | 1263 | 1010 |10
I would like to represent this count in terms of Percentage. How do I do the calculation? Please let me know.
... View more
06-12-2018
01:40 AM
I have requirement where in i have to display in a timerange, what is the peak number of request per min and corresponding max response time during that min
Below is the query which gives me the for a span 1 min what was the count of thread and max response time for the selected timerange
host=test, index=prod | timechart count(R) as ThreadCount, max(response_time) as ResponseTime by host_type
In above result i would like to get what was the peak numbr of request the host_type was able to handle and what was the maximum response time when it was handling the peak request. something similar to below,
host=test, index=prod | timechart count(R) as ThreadCount, max(response_time) as ResponseTime by host_type|streamstats max(ThreadCount) as MaxThreadCount by host_type|sort +ThreadCount |stats first(ResponseTime) as CorrespondingResponseTime |where ThreadCount=MaxThreadCount|table MaxThreadCount, CorrespondingResponseTime
I am pretty sure something wrong in my query. Could you please help me in getting the peak number of request the host_type was able to handle and what was the maximum response time when it was handling the peak request.
... View more
- Tags:
- splunk-enterprise
05-28-2018
02:52 AM
Individually both query works. But it doesnt work when added as a panel in a dashboard
... View more
05-28-2018
02:51 AM
Still no luck. It is still waiting for input
... View more
05-28-2018
12:29 AM
Below is the query added as a panel to dashboard,
|inputlookup product-dashboard-lookup.csv |search Product=* AND R=* | map [search host=prod* R="$R$*" |eval Product="$Product$" ]|stats count by Product
The dashboard contains "Time" as input panel.
... View more
05-21-2018
03:03 AM
Map does work. But the problem i am facing now is i am unable to add this as one of the panel in the Dashboard. It says "Search is waiting for Input". I guess its becuase of the dynamic parameter passed. How do i make the search as part of a Dashboard ?
... View more
05-18-2018
05:39 AM
Doesnt work since the R has wildcard in lookup file whereas the events contain the actual R.
... View more
05-18-2018
02:05 AM
I have a lookup file in below format
Product|R
AAAA|/ffff/*
I have some events i like R="/fff/abc" and some like R="/ffff/xyz.jsp"
Using this query i am able to fetch R counts
index=prod* |search [|inputlookup product-dashboard-lookup.csv |fields R ]|stats count as Rcount by R
Result for the above query is
R | Rcount
/fff/abc|10
/fff/xyz.jsp | 10
But i would like to get by Product instead of R something like below
AAAA | 20
How do i achieve this ?
... View more
- Tags:
- splunk-enterprise
11-28-2017
02:54 AM
I am trying to build panel which will show when GC occurred and what was the CPU time when GC occurred & before GC occurred. The problem is the search queries need to be build from two different sources. Below are the queries
Time at which GC occurred
index=gc host =testserver sourcetype="gc" "GC (Allocation Failure)" |table _time
Thread CPU time across the server
index=appln host=testserver | timechart span=5m sum(THREAD_CPU_MS) as CUM_THREAD_CPU_MS
How do i combine both into one chart ?
... View more
- Tags:
- splunk-enterprise
11-26-2017
08:30 PM
@niketnilay $tokenhost$ -> host="pft-web-1" OR host="pft-web-2"
The tokenhost is based on the multiselected options. It can either be one server or 2 server or it can be All too.
$hosttype$ is passed from another dashboard. This dashboard is drilldown of another. Version of splunk - 6.4.1
... View more
11-25-2017
03:28 AM
No luck. The input lists down the server name except for the "All" option
... View more
11-24-2017
06:01 AM
Hi , I have a token $hosstype$ which will get values as 'web', 'rpt' etc. If All option is selected the value to be passed to $tokenhost$ should be "prod-$hosttype*". How do i assign value as concatenated string with another token ?
<label>$server$</label>
<search>
<query>index=app sourcetype=app_gc_log host="prod-$hosttype$*"| dedup host |sort host | table host</query>
<earliest>-30d@d</earliest>
<latest>now</latest>
</search>
<choice value="prod-$hosttype$*">All</choice>
<fieldForLabel>host</fieldForLabel>
<fieldForValue>host</fieldForValue>
<valuePrefix>host=</valuePrefix>
<delimiter> OR </delimiter>
</input>
... View more
- Tags:
- splunk-enterprise
11-23-2017
03:04 AM
i see the value in label
... View more
11-23-2017
02:50 AM
It is passed from another dashboard but I am pretty sure the value is getting passed to $hosttype$. I am able to see the value passed.
... View more
11-23-2017
01:57 AM
Error displays right below the multiselect "could not create search"
... View more