Splunk Search

How to search the count of IDs processed for multiple response time ranges?

prashanthberam
Explorer

hi i have two fields: IDs and response time in seconds. so by using the response time, i need to break down events
0-1 sec how many IDs were processed (their count)
1-2 sec how many IDs were processed
.....
9-10 sec how many IDs were processed

can someone help me thanks.

0 Karma
1 Solution

prashanthberam
Explorer

Thanks for your answer i got it by using the ceil and floor commands...thank you so much for your answers..it looks like it will also work for my case

0 Karma

niketn
Legend

Seems like you need the following, IDs processed every second (which in-turn will require you to run the search for shorter duration) :
your base search ID=* | timechart span=1s count(ID) as "IDs Processed"

If this is not what you need please provide field names and examples.

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...