Splunk Search

Time search for log

keshab
Path Finder

Hi,

What will be the search condition if I wanna display only one log line if they occur within 5 min??

For e.g.

10:10:30 tomcat trying to restart
10:9:10 tomcat trying to restart

I want splunk to count those two events as one if they occur within 5 min time duration.

Tags (2)
0 Karma

Ayn
Legend

You could use transaction with a maxpause of 5 minutes. That way Splunk will create a new transaction when no additional events are found within 5 minutes after an event. Let's say the text you're matching on is available in the field "status_message".

... | transaction maxpause=5m status_message

Using this you'll get a bunch of transactions - in the cases where another event has occurred within 5 minutes after the a previous event, all these events will be put into the same transaction.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...