Splunk Search

P90 Latency

jack_sumatra
Explorer

I have a query like this

 

sourcetype=tseltdw tags{}= "request"
| fillnull data.service,data.service1, api_revamp,data.status, tags{}, keyword, keyword_api,data.timeTaken
| eval keyword_api=if(keyword LIKE "user/628%" OR keyword LIKE "user/08%" ,"user/msisdn",keyword)
| eval data.service1= if(len('data.service')>200, "null",'data.service')
| eval datex=strftime(_time,"%Y-%m-%d")
| eval datetime=strftime(_time,"%Y-%m-%d %H:00:00")
| eval hourx=strftime(_time,"%H") | eval data.uri3= if(len('data.uri2')>100, "null",'data.uri2')
| stats count as trx by datex, hourx, datetime, data.service1, data.status, tags{}, data._id, keyword_api,api_revamp, data.timeTaken
| sort data.timeTaken asc

and return like this. 

jack_sumatra_0-1626163241321.png


Can anyone help me how to return one value only with p90 percentile by data.timeTaken?

Much appreciated for any help, thank you.

Labels (2)
Tags (2)
0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...