Splunk Search

Time duration

chaitu99
Explorer

Hi,

03/22/2013 05:27:59.603 Message 1
03/22/2013 05:27:59.920 Message 1
03/22/2013 05:28:00.245 Message 1
03/22/2013 05:28:00.561 PROTOCOL 5
03/22/2013 05:28:00.876 Message
03/22/2013 05:28:01.202 FACTOR 6
03/22/2013 05:28:01.518 Message 9
03/22/2013 05:28:01.520 Message 9

I need duration between ("message 1" just before PROTOCOL 5) AND Message 9 just after FACTOR 6

but i have written query below like..

source="$SOURCE" |transaction startswith=("Message 1") endswith=("Message 9")|search ("PROTOCOL 5")|stats count perc95(duration) as VALUE

but that is not working because it is taking first message 1 timestamp value but i need just before PROTOCOL 5 message value.

Please let me know how to go ahead.

Tags (1)
0 Karma
1 Solution

rechteklebe
Path Finder

Change the time frame to 05:28:00.245 - 05:28:01.518. Should work.

View solution in original post

0 Karma

rechteklebe
Path Finder

Change the time frame to 05:28:00.245 - 05:28:01.518. Should work.

0 Karma

rechteklebe
Path Finder

I think it depends on the fields you defined in your environment. Are there any defined fields "startTime" "EndTime" or any other fields which could refer to each event?

Or is there no time fields and all fields are the same for message 1 e.g.?

0 Karma

chaitu99
Explorer

say there is no time stamp then how can we get the time difference?

is there any alternative to get time difference without that?

0 Karma

rechteklebe
Path Finder

You can also try using this:

source="$SOURCE" |transaction startswith=("05:28:00.245 Message 1") endswith=("05:28:01.518 Message 9")|search ("PROTOCOL 5")|stats count perc95(duration) as VALUE

I think your timestamp should also be available in the event itself..like this:

Splunk timestamp --> [timestamp, message]

0 Karma

chaitu99
Explorer

actually here time stamps are not constant. main thing is we need to find the time difference as stated above.
could you please help us?

0 Karma
Get Updates on the Splunk Community!

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...

From GPU to Application: Monitoring Cisco AI Infrastructure with Splunk Observability ...

AI workloads are different. They demand specialized infrastructure—powerful GPUs, enterprise-grade networking, ...

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...