Splunk Search

Counting based on range

Nidd
Path Finder

I have an application log like:

8/7/19
1:30:35.977 AM  
[8/7/19 1:30:35:977 MST] 00000232 MyClass I   Method Process | ProcessingTime=8ms
host =  myHost source = /location/SystemOut.log 

There are many such logs with different ProcessingTime.

I would like to have a range query that would differentiate the ProcessingTime like:

0-100ms         5
100-200ms       12
200-500ms       6
500-1000ms      24
1000-500ms      40
above 5000ms    2
Tags (2)
0 Karma

jpolvino
Builder

If this is a duplicate question, please delete it.

0 Karma

Nidd
Path Finder

I don't find any option of delete here !! Please help how.

0 Karma

Nidd
Path Finder

Yes. Thank you

0 Karma

jpolvino
Builder

I think you already asked this question here: here

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...