Dashboards & Visualizations

How do you calculate response time for events by field?

rohinisb91
Observer

Hi,

I have logs in the following format:

2018-10-31 16:00:00 START : run() for ruleId=xyz
2018-10-31 16:00:57 END : run() for ruleId=xyx

I want to plot a chart indicating the response times by ruleId. Any help is appreciated.

0 Karma
1 Solution

renjith_nair
Legend

@rohinisb91 ,
Try

index="your search" "START" OR "END"|stats range(_time) as difference by ruleId
---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

0 Karma

renjith_nair
Legend

@rohinisb91 ,
Try

index="your search" "START" OR "END"|stats range(_time) as difference by ruleId
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

rohinisb91
Observer

Thank you!

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...