Splunk Search

How to generate an IIS search for how many transactions have hit a single server?

Curman
New Member

New to Splunk and am having trouble writing a search that would tell me how many IIS transactions have hit a single server over one month with one minute granularity. I would also like this to be "visualized" with the average response time.

0 Karma
1 Solution

Richfez
SplunkTrust
SplunkTrust

OK, great. Can you help us with a bit more information?

1) You do have the events coming into Splunk already?
2) And you can find them in a search?
3) Your issue is really how to transform those raw events into that particular search/report?

If that's all true, then..

4) Are the events parsed into fields properly (e.g. is the sourcetype set right, so that if you run a search in "Verbose" mode you can see fields like c_ip and time_taken ) ?

Lastly, then, what do you mean by ...

5) How would you define an "IIS transaction?"

6) How does that interact with "time_taken"?
7) 1 minute stats over 30 days is ~45,000 points. Can you display that? I can't.

It's possible something as simple as

sourcetype=iis | bin span=1m _time | stats avg(time_taken) by _time 

and switching to your Visualization tab and playing with some things in there. Indeed, try the above search over the past 4 hours or so and tell me what it gets you...

If that actually works for your needs, I'll move this to an answer and we'll be done. But I think you'll have an answer in here that either a) says we need a bit more work or b) need to redefine the problem.

Happy Splunking!
-Rich

View solution in original post

0 Karma

Richfez
SplunkTrust
SplunkTrust

OK, great. Can you help us with a bit more information?

1) You do have the events coming into Splunk already?
2) And you can find them in a search?
3) Your issue is really how to transform those raw events into that particular search/report?

If that's all true, then..

4) Are the events parsed into fields properly (e.g. is the sourcetype set right, so that if you run a search in "Verbose" mode you can see fields like c_ip and time_taken ) ?

Lastly, then, what do you mean by ...

5) How would you define an "IIS transaction?"

6) How does that interact with "time_taken"?
7) 1 minute stats over 30 days is ~45,000 points. Can you display that? I can't.

It's possible something as simple as

sourcetype=iis | bin span=1m _time | stats avg(time_taken) by _time 

and switching to your Visualization tab and playing with some things in there. Indeed, try the above search over the past 4 hours or so and tell me what it gets you...

If that actually works for your needs, I'll move this to an answer and we'll be done. But I think you'll have an answer in here that either a) says we need a bit more work or b) need to redefine the problem.

Happy Splunking!
-Rich

0 Karma

Curman
New Member

Thank you, this has given me the start that I needed to achieve what I'm looking for.

0 Karma

woodcock
Esteemed Legend

Show a few sample events.

0 Karma

Curman
New Member

Thank You but I don't think I can post examples from our logs without heavily editing them

0 Karma
Get Updates on the Splunk Community!

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...