Splunk Search

get data by time

Learner
Path Finder

hi all, in my original search im getting data by folloing command:

 

| stats range(_time) as timetaken by CorrelationID| stats count as Total, avg(timetaken) as AvgResponseTime, perc95(timetaken) as P95ResponseTime

 

but now, i want this data on hourly basis. so i tried the following script: 

 

 |bin _time span=1d |eval Time=strftime(_time , "%d/%m/%Y %H:%M")| stats range(_time) as timetaken by CorrelationID| stats count as Total, avg(timetaken) as AvgResponseTime, perc95(timetaken) as P95ResponseTime by Time

 

 but this gives me 0 value. i'm seeking for the right way to get data on hourly basis. 

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

The bin command rounds off _time values to the day so all events that happen on the same day will have the same timestamp (2020-12-08T00:00:00 today, for example).  The range(_time) function will return 0 on any given day.

To get hourly data, however, one should use span=1h rather than span=1d and use _time in the by clause of the final stats.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...