Splunk Search

Convert a string with percentage sign to a number so it can be evaluated?

charanramireddy
New Member

Hello,

I have this query to alert me when percentage_q_full reaches greater than certain number

eval alert=case((PERCENT_Q_FULL>90), "Critical", (PERCENT_Q_FULL>80), "Warning", true(), "N/A")

but all the column values of alert shows as N/A because PERCENT_Q_FULL has values in percentage. These values are being extracted using multikv.

PERCENT_Q_FULL
95.00%
3.12%
5.13%
0.00%
100.00%

How do I convert it so that alert column shows me critical vs warning ?

Thank you.

0 Karma
1 Solution

s2_splunk
Splunk Employee
Splunk Employee

Add | convert rmunit(PERCENT_Q_FULL) before your existing eval to remove the trailing unit character(s).

From the search reference manual:

rmunit()
Syntax: rmunit()
Description: Looks for numbers at the beginning of the value and removes trailing text. You can use wild card characters in the field name.

View solution in original post

s2_splunk
Splunk Employee
Splunk Employee

Add | convert rmunit(PERCENT_Q_FULL) before your existing eval to remove the trailing unit character(s).

From the search reference manual:

rmunit()
Syntax: rmunit()
Description: Looks for numbers at the beginning of the value and removes trailing text. You can use wild card characters in the field name.

charanramireddy
New Member

thank you. This works.

0 Karma
Get Updates on the Splunk Community!

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

A Guide To Cloud Migration Success

As enterprises’ rapid expansion to the cloud continues, IT leaders are continuously looking for ways to focus ...

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...