Splunk Search

P90 Latency

jack_sumatra
Explorer

I have a query like this

 

sourcetype=tseltdw tags{}= "request"
| fillnull data.service,data.service1, api_revamp,data.status, tags{}, keyword, keyword_api,data.timeTaken
| eval keyword_api=if(keyword LIKE "user/628%" OR keyword LIKE "user/08%" ,"user/msisdn",keyword)
| eval data.service1= if(len('data.service')>200, "null",'data.service')
| eval datex=strftime(_time,"%Y-%m-%d")
| eval datetime=strftime(_time,"%Y-%m-%d %H:00:00")
| eval hourx=strftime(_time,"%H") | eval data.uri3= if(len('data.uri2')>100, "null",'data.uri2')
| stats count as trx by datex, hourx, datetime, data.service1, data.status, tags{}, data._id, keyword_api,api_revamp, data.timeTaken
| sort data.timeTaken asc

and return like this. 

jack_sumatra_0-1626163241321.png


Can anyone help me how to return one value only with p90 percentile by data.timeTaken?

Much appreciated for any help, thank you.

Labels (2)
Tags (2)
0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...