Splunk Search

How to use where condition to set threshold for avg response time

vinayakkoli
Observer

Hi Team, I am trying to get list of apis , whose avg response time is greater than particular threshold. Using Chart and timechart to gain avg response stats in dashboard to display APIs whose avg response time is greater than particular threshold. Query using: chart command:

index=### sourcetype=### | rex field=_raw "###(?[^ ]+)" | eval fields=split(Application_Name,"-") | eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) |chart span=15m avg(response_time)  over _time by Service_name where avg > 5 usenull=f | fields - OTHER

and timechart command:

index=### sourcetype=### | rex field=_raw "###(?[^ ]+)" | eval fields=split(Application_Name,"-") | eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) |timechart span=15m avg(response_time) by Service_name where avg > 5 usenull=f | fields - OTHER

.Results, for both using where condition, i could still see those api ,whose avg time is less than 5sec , but near to 5sec, e.g. api with 3 sec or 3.5 comes up panel.

Labels (2)
Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Try this variation of the timechart search.

index=### sourcetype=### 
| rex field=_raw "###(?[^ ]+)" 
| eval fields=split(Application_Name,"-") 
| eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) 
| timechart span=15m useother=f usenull=f avg(response_time) as avg by Service_name
| where avg > 5
---
If this reply helps you, Karma would be appreciated.
0 Karma

vinayakkoli
Observer

Hi @richgalloway , thank you for reply.

After trying below, with time chart now its returning zero events, but in actual events exists.


0 Karma

richgalloway
SplunkTrust
SplunkTrust

Let's debug the query.  Run this search.  Do you get results?  Is the Service_name field populated properly?

index=### sourcetype=### 
| rex field=_raw "###(?[^ ]+)" 
| eval fields=split(Application_Name,"-") 
| eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) 

 

Run this search next.  Do you get results?  Is the avg field populated properly?  Is the value of the avg field greater than 5 for any row?

index=### sourcetype=### 
| rex field=_raw "###(?[^ ]+)" 
| eval fields=split(Application_Name,"-") 
| eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) 
| timechart span=15m useother=f usenull=f avg(response_time) as avg by Service_name

 

 

---
If this reply helps you, Karma would be appreciated.
0 Karma

vinayakkoli
Observer

Hi @richgalloway 

Yes, this returning the results correctly, with expected service name and avg response time greater than 5secs.

vinayakkoli_0-1592400542148.png

 



0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...