Splunk Search

P90 Latency

jack_sumatra
Explorer

I have a query like this

 

sourcetype=tseltdw tags{}= "request"
| fillnull data.service,data.service1, api_revamp,data.status, tags{}, keyword, keyword_api,data.timeTaken
| eval keyword_api=if(keyword LIKE "user/628%" OR keyword LIKE "user/08%" ,"user/msisdn",keyword)
| eval data.service1= if(len('data.service')>200, "null",'data.service')
| eval datex=strftime(_time,"%Y-%m-%d")
| eval datetime=strftime(_time,"%Y-%m-%d %H:00:00")
| eval hourx=strftime(_time,"%H") | eval data.uri3= if(len('data.uri2')>100, "null",'data.uri2')
| stats count as trx by datex, hourx, datetime, data.service1, data.status, tags{}, data._id, keyword_api,api_revamp, data.timeTaken
| sort data.timeTaken asc

and return like this. 

jack_sumatra_0-1626163241321.png


Can anyone help me how to return one value only with p90 percentile by data.timeTaken?

Much appreciated for any help, thank you.

Labels (2)
Tags (2)
0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...