Splunk Search

chart percentage over a timeframe

charles981
Engager

I have a webserver log with one entry per request. Every entry contains the used cipher. I want to generate a chart over the last days how many requests used cipher X as percentage of all requests for every hour in the timeframe.
It's no problem to select the right entries, but I'm not able to generate the chart. 😞 Every help is appreciated.

Tags (2)
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

Try something like this:

sourcetype=your_data | bin span=1h _time | stats count by _time cipher
| eventstats sum(count) as Total by _time | eval perc = count / Total * 100
| xyseries _time cipher perc

That's assuming the cipher name is extracted in field cipher.

View solution in original post

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

Try something like this:

sourcetype=your_data | bin span=1h _time | stats count by _time cipher
| eventstats sum(count) as Total by _time | eval perc = count / Total * 100
| xyseries _time cipher perc

That's assuming the cipher name is extracted in field cipher.

0 Karma

charles981
Engager

Thanks a lot. Thats what I need!

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...