Splunk Search

How to extract a field that has value more than 10 sec?

splunknoob2020
Engager

I have a splunk query that gives me all the logs of slow queries(AQL) but I need to know which ones have taken more than 10 sec. I need to compare them with previous version slow queries and see if there is any improvement?

My splunk query:

index=hello_world host_zone=pr source="*hi*" "slow query"

Sample log:

slow query: 'FOR s IN abcdef FILTER LOWER(ghijk) == '123456789' LET serviceId = lmno FOR v IN pqrst GRAPH uvw_xyz RETURN v', bind vars: {}, took: 5.384533 s

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @splunknoob2020,

your problem is to extract the field or to compare results?

if it's extracting field, you can use a regex or the field extractor, using regexes:

| rex "took:\s+(?<took>[^ ]+)"

that you can test at https://regex101.com/r/b9Mk8r/1

Ciao.

Giuseppe

0 Karma

splunknoob2020
Engager

Thank you for the response, @gcusello . Your query helped me in extracting the field, now I need to get all the slow queries which took more than 10 sec. Let's say in a tabular format I would like to see the slow query and the time it took to run in two columns?

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @splunknoob2020,

not you have to create your search adding the condition (>10 sec) and the fields to list, something like this:

index=hello_world host_zone=pr source="*hi*" "slow query"
| rex "took:\s+(?<took>[^ ]+)"
| where took>10
| table <your-fields>

Ciao.

Giuseppe 

Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...