Splunk Search

Need help in developing splunk query

saireddy
Loves-to-Learn Lots

Hi All,

2021-07-12 09:33:20,659 - daemons.save_claim_dex.src.__main__ - INFO - Skill='SAVE_CLAIM_INFO', message='skill execution info', ActivationId='3b660cbf-77c0-4999-a76c-aca5833aa3ca', Method='POST', TxnStatus='SUCCESS', StatusCode='200', TxnTimeTaken='34.358', StartTimestamp='1626082400.624848', EndTimestamp='1626082400.659206', TxnStartTime='2021-07-12T09:33:20.624848', TxnEndTime='2021-07-12T09:33:20.659206'


2021-07-12 09:33:20,582 - daemons.dex_gen_resp.src.__main__ - INFO - Skill='DEX_GENERATE_RESPONSE', message='skill execution info', ActivationId='3b660cbf-77c0-4999-a76c-aca5833aa3ca', Method='POST', TxnStatus='SUCCESS', StatusCode='200', TxnTimeTaken='91.984', StartTimestamp='1626082400.490515', EndTimestamp='1626082400.582499', TxnStartTime='2021-07-12T09:33:20.490515', TxnEndTime='2021-07-12T09:33:20.582499'


2021-07-12 09:33:20,435 - daemons.save_claim_dex.src.__main__ - INFO - Skill='SAVE_CLAIM_INFO', message='skill execution info', ActivationId='3b660cbf-77c0-4999-a76c-aca5833aa3ca', Method='POST', TxnStatus='SUCCESS', StatusCode='200', TxnTimeTaken='49.063', StartTimestamp='1626082400.386638', EndTimestamp='1626082400.435701', TxnStartTime='2021-07-12T09:33:20.386638', TxnEndTime='2021-07-12T09:33:20.435701'

From the above log, I need two splunk queries.

1. trace the activationid which processed different skills, provide end to end response time which should include all the skills response times.

2.  grouping info-skill fields response times [ex SAVE_CLAIM_INFO  ,DEX_GENERATE_RESPONSE in table format]

 

 

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

It looks like the total_time_tkn field doesn't exist.  Is the strptime format correct?  If you share a sample event we can help you check.

---
If this reply helps you, Karma would be appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

What have you tried so far?  What results did you get?

---
If this reply helps you, Karma would be appreciated.
0 Karma

saireddy
Loves-to-Learn Lots

"*3b660cbf-77c0-4999-a76c-aca5833aa3ca*"
| eval Date = date_month." ".date_mday
| eval Hour = date_hour
| eval start_time=strptime(StartTimestamp, "%FT%T.%3N")
| eval end_time=strptime(EndTimestamp, "%FT%T.%3N")
| eval total_time_tkn=round(((end_time-start_time) * 1000),0)
| rex field=_raw "INFO - Skill='(?.*?)',"
| stats count avg(total_time_tkn) as Avg p90(total_time_tkn) as 90th by Skill StatusCode,TxnStatus

Below i don't see avg and 90thP.  Also am adding activationid in the query.  which i want to get in runtime.

saireddy_0-1626101395483.png

 

0 Karma

saireddy
Loves-to-Learn Lots

can anyone please help.
@gcusello 

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Unlocking Unified Insights: New Gigamon Federated Search App for Splunk

In today’s data-heavy environment, organizations are caught in a data distribution dilemma. As data volumes ...

GA: New Data Management App in Splunk Platform

Streamlining Data Management: Introducing a unified experience in Splunk Managing data at scale shouldn’t feel ...

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...