Splunk Search

How to identify session from log based on request timestamp

moohkhol
New Member

Hi Guys,
My log message looks like below,

Time message
10:00 AM “log message 1”
10:10 AM “log message 2”
10:20 AM “log message 2”
10:41 AM “log message 3”
10:45 AM “log message 4”

11:20 AM “log message 5”
11:21 AM “log message 6”
11:22 AM “log message 7”
11:25 AM “log message 8”
11:45 AM “log message 9”
11:55 AM “ ….”
12:28 PM “…..”

I want above message to be grouped into 4 groups and print following,

Start_time 10:00 AM count 5
Start_time 11:20 AM count 6
Start_time 12:28 PM count 1

We are splitting message based on the any two consecutive record having time difference of more than 30 min.
Here, 10:45 AM and 11:20 AM is having 35 min, so breaking it and again we found at 11:55 AM, since difference between 11:55 AM and 12:28 PM is 33 Min.

Tags (1)
0 Karma

martin_mueller
SplunkTrust
SplunkTrust

That sounds like a job for transaction with maxpause=30m. See http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Transaction for in-depth info.

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...