Splunk Search

How to calculate timespan of a field value as session-duration only for a specific sourcetype ?

shresthas
New Member

I need to extract the session-duration from different BI server logs. Most BI server logs have clearly defined session-duration fields you can extract by defining extraction logic in props.conf but for one server log, I have to calculate the session using transaction with session id as the field and using eval to assign the duration as session-duration.
But can I do this for only a specific sourcetype ? If not can I do this in the props.conf ?

0 Karma

strive
Influencer

I think, in props.conf it is not possible. You can try something like this in search

Some search terms... | transaction sessionId | eval SessionDuration = case(sourcetype!="A",SessionDuration,sourcetype=="A",SET-SST)| Other search terms

where SET is 'Session End Time' and SST is 'Session Start Time'

0 Karma
Get Updates on the Splunk Community!

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Community Content Calendar, November Edition

Welcome to the November edition of our Community Spotlight! Each month, we dive into the Splunk Community to ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...