Splunk Search

Need a query for the same event repeated in a defined time

esaionz
New Member

Hi,
I need a query to show me all occurrances when the same message is logged within 200ms.
Log example:

Message="Landed on page"
xxxxxx
yyyyyyy
Message="Landed on page"
zzzzzzz
uuuuu
jjjjjjjjjjj
Message="Landed on page"

I need to show all Message="Landed on page" which happened only with 200ms time from each other.
Thanks!

0 Karma

DalJeanis
Legend

try this. (replace with the actual index and sourcetype)

index=myindex sourcetype=something Message="Landed on page"
| streamstats current=f window=1 last(_time) as next_time by Message
| reverse
| streamstats current=f window=1 last(_time) as last_time by Message
| where (next_time < _time + 0.2) OR (laxt_time > _time - 0.2) 

This will give you every Message that is within 200 ms (0.2 second) of another of the same Message.

0 Karma

to4kawa
Ultra Champion

use streamstats range() and select with where

0 Karma

esaionz
New Member

I'm new to Splunk, how should I use it?. index=* message where message is repeated within 200ms. Thanks.

0 Karma

to4kawa
Ultra Champion

see reference and try examples. and then, make your query.
https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Streamstats
https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Where

your log is unclear. so , you should make query yourself.

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...