Splunk Search

Table view in dashboard

venkat0896
Path Finder

Hi

i am trying to create a Dashboard. i need some assistance on creating a table format.
i have some executions like
1. XXX All rules has been executed in 1068 ms.
2. YYY All rules has been executed in 900 ms.
3. ZZZ All rules has been executed in 1300 ms.

i want to view this as a table with total count of occurrence and Average response time
the table should look like

Request Count Avg response time
XXX 1 1068 ms
YYY 1 900 ms
ZZZ 1 1300 ms

Please help on this. thanks in advance !

Tags (2)
0 Karma
1 Solution

ansusabu
Communicator

@venkat0896 If the logs always follow the below pattern
2019-08-20 13:55:47,054 INFO package name XXX All rules has been executed in 540 ms
(date),ddd INFO package name XXX All rules has been executed in 540 ms

then you can use the following regex,include '\)\s' at the start of regex which richgalloway has mentioned and use the same query

View solution in original post

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...