Splunk Search

Transactions that span time period are counted in stats in all time periods from start to end

nobillgates
Engager

I need stats on transactions (WAN outages) over a given period - 1 day, for instance - to be grouped by hour.

However, if a transaction starts in one hour and ends in the next or subsequent hours, it is counted in stats in each of the hours from start to end. It should be counted only once for the whole duration:

...|transaction host startswith="is down" endswith="is up"|stats count(duration) as "Count by hour" BY date _ hour | sort by date _ hour

I guess I need to count only start or end of each transaction, but can this be done in the same search, or is there yet a better way to achieve this?

MTIA

Tags (1)

gkanapathy
Splunk Employee
Splunk Employee
 ... | bucket _time span=1h | stats count by _time

Don't use the date_* fields, use _time.

Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...