<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query for times in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104487#M27074</link>
    <description>&lt;P&gt;Hi Thanks for your reply. Just to be on the same page, i am looking for count of each uri for which response time is greater than the 90th percentile time. You are right, the field name is not time. &lt;/P&gt;

&lt;P&gt;Like below. &lt;/P&gt;

&lt;P&gt;URI     COUNT    90thPercentile&lt;BR /&gt;
xxxx     10        15.6 secs&lt;BR /&gt;
yyyy      5        10.23&lt;BR /&gt;
zzzz      14       9.78&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jul 2013 03:52:58 GMT</pubDate>
    <dc:creator>xvxt006</dc:creator>
    <dc:date>2013-07-24T03:52:58Z</dc:date>
    <item>
      <title>Query for times</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104485#M27072</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;i would like to count how many uris that have response times greater than the 90th percentile times for response times greater than x secs..Say 30 secs and list them out. &lt;/P&gt;

&lt;P&gt;I tried this. But it is not resulting any results&lt;BR /&gt;
sourcetype="access_combined_wcookie" host=xxxx Time&amp;gt;30 | eventstats perc90(Time) as hightimes by uri_path | where Time&amp;gt;highimes | table uri_path, count, hightimes&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:24:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104485#M27072</guid>
      <dc:creator>xvxt006</dc:creator>
      <dc:date>2020-09-28T14:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: Query for times</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104486#M27073</link>
      <description>&lt;P&gt;I'm pretty sure that the relevant field name in access_combined_wcookie is called &lt;CODE&gt;req_time&lt;/CODE&gt;, rather than &lt;CODE&gt;Time&lt;/CODE&gt;.  At least, in the default access extractions that ship with Splunk there is no extracted field called &lt;CODE&gt;Time&lt;/CODE&gt;. &lt;/P&gt;

&lt;P&gt;If you run these searches are you getting extracted values for Time?  Or only for req_time?&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;sourcetype="access_combined_wcookie" host=xxxx | table Time req_time&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Otherwise you're close. You have one little typo (highimes != hightimes), and if you want a "count" field, you need another stats on the end to roll it up.  &lt;/P&gt;

&lt;P&gt;Here you go, assuming again that req_time is the field name and not Time.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;sourcetype="access_combined_wcookie" host=xxxx req_time&amp;gt;30 | eventstats perc90(req_time) as hightime by uri_path | where req_time&amp;gt;hightime | stats count last(hightime) as hightime by uri_path&lt;/CODE&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:25:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104486#M27073</guid>
      <dc:creator>sideview</dc:creator>
      <dc:date>2020-09-28T14:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: Query for times</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104487#M27074</link>
      <description>&lt;P&gt;Hi Thanks for your reply. Just to be on the same page, i am looking for count of each uri for which response time is greater than the 90th percentile time. You are right, the field name is not time. &lt;/P&gt;

&lt;P&gt;Like below. &lt;/P&gt;

&lt;P&gt;URI     COUNT    90thPercentile&lt;BR /&gt;
xxxx     10        15.6 secs&lt;BR /&gt;
yyyy      5        10.23&lt;BR /&gt;
zzzz      14       9.78&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2013 03:52:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104487#M27074</guid>
      <dc:creator>xvxt006</dc:creator>
      <dc:date>2013-07-24T03:52:58Z</dc:date>
    </item>
    <item>
      <title>Re: Query for times</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104488#M27075</link>
      <description>&lt;P&gt;BTw, i tried the modified query but not getting any data&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2013 03:54:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104488#M27075</guid>
      <dc:creator>xvxt006</dc:creator>
      <dc:date>2013-07-24T03:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: Query for times</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104489#M27076</link>
      <description>&lt;P&gt;what does it mean by - stats count last(hightime) as hightime. Say if the 90th percentile time is 15.6 secs but there are another 5 instances where the time is greater than 15.6 secs. Does this give count as 5? and also would it show the hightime (90th percentile) as 15.6?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2013 04:13:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104489#M27076</guid>
      <dc:creator>xvxt006</dc:creator>
      <dc:date>2013-07-24T04:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: Query for times</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104490#M27077</link>
      <description>&lt;P&gt;Because of the &lt;CODE&gt;| where req_time&amp;gt;hightime&lt;/CODE&gt; , the rows coming into that stats clause will &lt;EM&gt;only&lt;/EM&gt; be the rows where the req_time is higher than the 90th percentile value.  then the stats clause will give, for each uri_path,  count (number of rows higher than 90th percentile) and last(hightime) as hightime (which is just the 90th percentile value).&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:25:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-for-times/m-p/104490#M27077</guid>
      <dc:creator>sideview</dc:creator>
      <dc:date>2020-09-28T14:25:07Z</dc:date>
    </item>
  </channel>
</rss>

