Splunk Search

Combine searches

pathuris
New Member

I have success events in sourcetype XYZ. Failure events in sourcetype ABC. I want to show failure count as a percentage of Success count. How can I do this?

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

This should get you started.

sourcetype=XYZ OR sourcetype=ABC | stats count as Total, count(eval(sourcetype="ABC")) as Fail | eval PercentFail=(Fail/Total)*100
---
If this reply helps you, Karma would be appreciated.
0 Karma

MuS
Legend

Hi pathuris,

you can search over both sourcetypes and count each events and compare them with this per day search example:

base search here sourcetype=XYZ OR sourcetype=ABC
| bucket _time span=1d  
| stats count(eval(events=="success")) AS success_count count(eval(events=="failure")) AS failure_count 
| eval perc=failure_count*100/(failure_count + success_count)

This assumes you have a field called events which contains either success or failure as status.

Hope this helps ...

cheers, MuS

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...