Splunk Search

Search Query Specific Values

msarkaus
Path Finder

Hello,

I'm trying to only capture and show only the time it took for the service to complete. Shown below, is is a record that says the service completed in 1901 ms. 

If you could please help write a search query to identify and return records into my dashboard panel that exceed 1909 ms?

So, for example, if there are 10 records that exceed 1900 ms, it will look something like this:

GetRisk completed in 1909 ms

GetRisk completed in 1919 ms

GetRisk completed in 2001 ms

GetRisk completed in 2100 ms

As so on.....

msgTxt returns:

VeriskService - GetRisk completed in 1909 ms. (request details: environment: Production | desired services: BusinessOwnersTerritory | property type: Commercial xxxxx)

Thank you

Labels (1)
0 Karma

marnall
Motivator

Assuming that each event has one of those "GetRisk completed..." lines, you could use this regex and where combination:

index = yourindex <other filters like sourcetype, etc>
| rex field=_raw "GetRisk completed in (?<ms>\d+) ms"
| where ms > 1900
0 Karma

PickleRick
SplunkTrust
SplunkTrust

And what have you tried so far? And what fields you have parsed out from those events?

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...