Splunk Search

How to use where condition to set threshold for avg response time

vinayakkoli
Observer

Hi Team, I am trying to get list of apis , whose avg response time is greater than particular threshold. Using Chart and timechart to gain avg response stats in dashboard to display APIs whose avg response time is greater than particular threshold. Query using: chart command:

index=### sourcetype=### | rex field=_raw "###(?[^ ]+)" | eval fields=split(Application_Name,"-") | eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) |chart span=15m avg(response_time)  over _time by Service_name where avg > 5 usenull=f | fields - OTHER

and timechart command:

index=### sourcetype=### | rex field=_raw "###(?[^ ]+)" | eval fields=split(Application_Name,"-") | eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) |timechart span=15m avg(response_time) by Service_name where avg > 5 usenull=f | fields - OTHER

.Results, for both using where condition, i could still see those api ,whose avg time is less than 5sec , but near to 5sec, e.g. api with 3 sec or 3.5 comes up panel.

Labels (2)
Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Try this variation of the timechart search.

index=### sourcetype=### 
| rex field=_raw "###(?[^ ]+)" 
| eval fields=split(Application_Name,"-") 
| eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) 
| timechart span=15m useother=f usenull=f avg(response_time) as avg by Service_name
| where avg > 5
---
If this reply helps you, Karma would be appreciated.
0 Karma

vinayakkoli
Observer

Hi @richgalloway , thank you for reply.

After trying below, with time chart now its returning zero events, but in actual events exists.


0 Karma

richgalloway
SplunkTrust
SplunkTrust

Let's debug the query.  Run this search.  Do you get results?  Is the Service_name field populated properly?

index=### sourcetype=### 
| rex field=_raw "###(?[^ ]+)" 
| eval fields=split(Application_Name,"-") 
| eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) 

 

Run this search next.  Do you get results?  Is the avg field populated properly?  Is the value of the avg field greater than 5 for any row?

index=### sourcetype=### 
| rex field=_raw "###(?[^ ]+)" 
| eval fields=split(Application_Name,"-") 
| eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) 
| timechart span=15m useother=f usenull=f avg(response_time) as avg by Service_name

 

 

---
If this reply helps you, Karma would be appreciated.
0 Karma

vinayakkoli
Observer

Hi @richgalloway 

Yes, this returning the results correctly, with expected service name and avg response time greater than 5secs.

vinayakkoli_0-1592400542148.png

 



0 Karma
Get Updates on the Splunk Community!

CX Day is Coming!

Customer Experience (CX) Day is on October 7th!! We're so excited to bring back another day full of wonderful ...

Strengthen Your Future: A Look Back at Splunk 10 Innovations and .conf25 Highlights!

The Big One: Splunk 10 is Here!  The moment many of you have been waiting for has arrived! We are thrilled to ...

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Today, we’re excited to announce the release of a brand new AI assistant usage dashboard in Cloud Monitoring ...