Splunk Commands | Splunk stats | Splunk eventstats

Поделиться
HTML-код
  • Опубликовано: 2 янв 2025

Комментарии •

  • @kssaz3578
    @kssaz3578 2 года назад

    Excellent - coverage & explanation ---- Pls carry on doing these ...!

  • @saimanojkumar6355
    @saimanojkumar6355 3 года назад +1

    Hi Balaji Garu...
    I am learning splunk and searching for jobs ...
    Your videos are helpful to me
    Thank you

  • @MrAnkitmaster
    @MrAnkitmaster 3 года назад +1

    Super Balaji …thank you picture clear now😉 need more videos on splunk spl please make it✌🏾👏

    • @SplunkTalks
      @SplunkTalks  3 года назад

      Thank you Ankit. Ill make more videos.

  • @PradeepKumar-ps4cs
    @PradeepKumar-ps4cs 3 года назад +1

    informative enough for me to remember the concept. Thanks for making this video.

  • @Sugreev916
    @Sugreev916 3 года назад +1

    Nice explanation

  • @hpanamgipalli
    @hpanamgipalli 2 года назад

    Good video bro

  • @daryoushjoobbani3125
    @daryoushjoobbani3125 2 года назад

    Hi Sandip, i have a question regarding the chart command. I am trying to execute a search splunk command that shows both the count and percentage of the count in one chart command: so here is an example of splunk command that currently only shows the count and the total count: source="xyz" http_status_code | chart count by path_template, http_status_code | addtotals col=t This command shows each count of the http_status_code (y axis) and the path_template (x axis) and showing the total of the counts of all the http_status_code. Now i need to add the percentage (count/total) of each count when i know the number of counts. e.g. 40 (5%) or something like that. How would i do that using chart? Thanks!

  • @manu-nuke369
    @manu-nuke369 3 года назад

    Can use stats max(count) by user would yield the same result right

  • @mailraj2196
    @mailraj2196 2 года назад

    Can u advice how to calculate if less than 20% of avg count so I should get alert

  • @Sugreev916
    @Sugreev916 3 года назад

    rename command will impact the performance of the search..better avoid unless until its absolutely required

  • @taruchitgoyal3735
    @taruchitgoyal3735 3 года назад

    Hello Sir,
    I tried using max() to find the latest error in application logs:-
    |stats count, max(_time) by error
    I get values like 1631484056.103, 1631501959.541
    Thus, need your help to interpret the results and translate them to readable format.

    • @esm_47
      @esm_47 2 года назад

      | eval Time=strftime(_time, "%Y-%d-%m %H:%M") | table _time Time
      or you can just use
      | convert ctime(_time) as Time | table _time Time