Splunk Search

How to use where condition to set threshold for avg response time

vinayakkoli
Observer

Hi Team, I am trying to get list of apis , whose avg response time is greater than particular threshold. Using Chart and timechart to gain avg response stats in dashboard to display APIs whose avg response time is greater than particular threshold. Query using: chart command:

index=### sourcetype=### | rex field=_raw "###(?[^ ]+)" | eval fields=split(Application_Name,"-") | eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) |chart span=15m avg(response_time)  over _time by Service_name where avg > 5 usenull=f | fields - OTHER

and timechart command:

index=### sourcetype=### | rex field=_raw "###(?[^ ]+)" | eval fields=split(Application_Name,"-") | eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) |timechart span=15m avg(response_time) by Service_name where avg > 5 usenull=f | fields - OTHER

.Results, for both using where condition, i could still see those api ,whose avg time is less than 5sec , but near to 5sec, e.g. api with 3 sec or 3.5 comes up panel.

Labels (2)
Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Try this variation of the timechart search.

index=### sourcetype=### 
| rex field=_raw "###(?[^ ]+)" 
| eval fields=split(Application_Name,"-") 
| eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) 
| timechart span=15m useother=f usenull=f avg(response_time) as avg by Service_name
| where avg > 5
---
If this reply helps you, Karma would be appreciated.
0 Karma

vinayakkoli
Observer

Hi @richgalloway , thank you for reply.

After trying below, with time chart now its returning zero events, but in actual events exists.


0 Karma

richgalloway
SplunkTrust
SplunkTrust

Let's debug the query.  Run this search.  Do you get results?  Is the Service_name field populated properly?

index=### sourcetype=### 
| rex field=_raw "###(?[^ ]+)" 
| eval fields=split(Application_Name,"-") 
| eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) 

 

Run this search next.  Do you get results?  Is the avg field populated properly?  Is the value of the avg field greater than 5 for any row?

index=### sourcetype=### 
| rex field=_raw "###(?[^ ]+)" 
| eval fields=split(Application_Name,"-") 
| eval Service_name=mvindex(fields,1)."-".mvindex(fields,2) 
| timechart span=15m useother=f usenull=f avg(response_time) as avg by Service_name

 

 

---
If this reply helps you, Karma would be appreciated.
0 Karma

vinayakkoli
Observer

Hi @richgalloway 

Yes, this returning the results correctly, with expected service name and avg response time greater than 5secs.

vinayakkoli_0-1592400542148.png

 



0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...