Splunk Search

Need help in developing splunk query

saireddy
Loves-to-Learn Lots

Hi All,

2021-07-12 09:33:20,659 - daemons.save_claim_dex.src.__main__ - INFO - Skill='SAVE_CLAIM_INFO', message='skill execution info', ActivationId='3b660cbf-77c0-4999-a76c-aca5833aa3ca', Method='POST', TxnStatus='SUCCESS', StatusCode='200', TxnTimeTaken='34.358', StartTimestamp='1626082400.624848', EndTimestamp='1626082400.659206', TxnStartTime='2021-07-12T09:33:20.624848', TxnEndTime='2021-07-12T09:33:20.659206'


2021-07-12 09:33:20,582 - daemons.dex_gen_resp.src.__main__ - INFO - Skill='DEX_GENERATE_RESPONSE', message='skill execution info', ActivationId='3b660cbf-77c0-4999-a76c-aca5833aa3ca', Method='POST', TxnStatus='SUCCESS', StatusCode='200', TxnTimeTaken='91.984', StartTimestamp='1626082400.490515', EndTimestamp='1626082400.582499', TxnStartTime='2021-07-12T09:33:20.490515', TxnEndTime='2021-07-12T09:33:20.582499'


2021-07-12 09:33:20,435 - daemons.save_claim_dex.src.__main__ - INFO - Skill='SAVE_CLAIM_INFO', message='skill execution info', ActivationId='3b660cbf-77c0-4999-a76c-aca5833aa3ca', Method='POST', TxnStatus='SUCCESS', StatusCode='200', TxnTimeTaken='49.063', StartTimestamp='1626082400.386638', EndTimestamp='1626082400.435701', TxnStartTime='2021-07-12T09:33:20.386638', TxnEndTime='2021-07-12T09:33:20.435701'

From the above log, I need two splunk queries.

1. trace the activationid which processed different skills, provide end to end response time which should include all the skills response times.

2.  grouping info-skill fields response times [ex SAVE_CLAIM_INFO  ,DEX_GENERATE_RESPONSE in table format]

 

 

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

It looks like the total_time_tkn field doesn't exist.  Is the strptime format correct?  If you share a sample event we can help you check.

---
If this reply helps you, Karma would be appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

What have you tried so far?  What results did you get?

---
If this reply helps you, Karma would be appreciated.
0 Karma

saireddy
Loves-to-Learn Lots

"*3b660cbf-77c0-4999-a76c-aca5833aa3ca*"
| eval Date = date_month." ".date_mday
| eval Hour = date_hour
| eval start_time=strptime(StartTimestamp, "%FT%T.%3N")
| eval end_time=strptime(EndTimestamp, "%FT%T.%3N")
| eval total_time_tkn=round(((end_time-start_time) * 1000),0)
| rex field=_raw "INFO - Skill='(?.*?)',"
| stats count avg(total_time_tkn) as Avg p90(total_time_tkn) as 90th by Skill StatusCode,TxnStatus

Below i don't see avg and 90thP.  Also am adding activationid in the query.  which i want to get in runtime.

saireddy_0-1626101395483.png

 

0 Karma

saireddy
Loves-to-Learn Lots

can anyone please help.
@gcusello 

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...