Splunk Search

How to calculate duration difference between events considering regex?

amunag439
Explorer

Hello,

I have the following logs:

2019-05-30 14:39:00,115 traceId=AAAAAA msg=Incoming with body {"parameters":[{"dataType":0,"value":"{\"code\":\"OPEN\",....}...}]}

2019-05-30 14:43:56,778 INFO traceId=AAAAAA msg=Json Object Before n .. MqttMessageModel [sessionId=111, code=SENT, ...]

And I would like to get the time difference between these two events/logs. I need to know the difference depending on the code. As the code changes from OPEN to SENT, how long did it take?

In an ideal scenario if I had correct logs I would use the following.
But in my case how can I get the time difference between the events?

host=host" source="source"  code="OPEN" OR code="SENT"
 | transaction traceId startswith=OPEN endswith=SENT
 | table duration _time traceId
1 Solution

jnudell_2
Builder

Hi @amunag439 ,

Your ideal world search will probably work if you take the code="OPEN" OR code="SENT" out of the initial search:

host=host" source="source" 
| transaction traceId startswith=OPEN endswith=SENT 
| table duration _time traceId

or you could adjust it to work for your data (as long as tradeId is extracted properly):


host=host" source="source" "OPEN*" OR "SENT*"
| transaction traceId startswith=OPEN endswith=SENT
| table duration _time traceId

View solution in original post

jnudell_2
Builder

Hi @amunag439 ,

Your ideal world search will probably work if you take the code="OPEN" OR code="SENT" out of the initial search:

host=host" source="source" 
| transaction traceId startswith=OPEN endswith=SENT 
| table duration _time traceId

or you could adjust it to work for your data (as long as tradeId is extracted properly):


host=host" source="source" "OPEN*" OR "SENT*"
| transaction traceId startswith=OPEN endswith=SENT
| table duration _time traceId

amunag439
Explorer

Thanks for the response @jnudell_2. I have one more query related to this. What if I'm not able to extract traceId or any other common parameter/string from the logs? Does Splunk provide anything of that sort?

0 Karma

jnudell_2
Builder

If there is no common string/parameter to tie events together, I'm not sure how you would be able to create a transaction. The transaction command does have several options for limiting the size of transactions by time or number of events, but the use cases where that might work are probably very small.
The whole concept of a transaction is that you have a uniquely identifying piece of information that belongs to the same chain of events.

Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...