Dashboards & Visualizations

How do you calculate response time for events by field?

rohinisb91
Observer

Hi,

I have logs in the following format:

2018-10-31 16:00:00 START : run() for ruleId=xyz
2018-10-31 16:00:57 END : run() for ruleId=xyx

I want to plot a chart indicating the response times by ruleId. Any help is appreciated.

0 Karma
1 Solution

renjith_nair
Legend

@rohinisb91 ,
Try

index="your search" "START" OR "END"|stats range(_time) as difference by ruleId
---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

0 Karma

renjith_nair
Legend

@rohinisb91 ,
Try

index="your search" "START" OR "END"|stats range(_time) as difference by ruleId
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

rohinisb91
Observer

Thank you!

0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...