Splunk Search

Percent matching events

c799651
Explorer

I have a search that find a  match of events

this counts all events that match the string

index=data-kia-cer-app-n sourcetype=cer | regex "BLOCK,\d*,\d*,1"| stats count as "default"

 

I would like a search that results in a percent figure of this match as proportion of all events.

 

Thanks

Labels (2)
0 Karma
1 Solution

rnowitzki
Builder

Hi,

This adds a column "total" and "percentage" to the table:

index=data-kia-cer-app-n sourcetype=cer 
| eventstats count as total 
| regex "BLOCK,\d*,\d*,1"
| stats count as "default" by total 
| eval percentage=(default*100)/total


You might want to remove some decimals and add a "%" to the percentage field.. 

--
Karma and/or Solution tagging appreciated.

View solution in original post

0 Karma

rnowitzki
Builder

Hi,

This adds a column "total" and "percentage" to the table:

index=data-kia-cer-app-n sourcetype=cer 
| eventstats count as total 
| regex "BLOCK,\d*,\d*,1"
| stats count as "default" by total 
| eval percentage=(default*100)/total


You might want to remove some decimals and add a "%" to the percentage field.. 

--
Karma and/or Solution tagging appreciated.
0 Karma

c799651
Explorer

Thanks. This worked!!

0 Karma
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...