The table below explains in detail the steps of a Splunk Enterprise or Splunk Cloud Platform search to help you graph counts of payment requests and responses over time. For more information, review the use case monitoring payment responses.
Some commands, parameters, and field names in the searches below may need to be adjusted to match your environment. In addition, to optimize the searches shown below, you should specify an index and a time range when appropriate.
Splunk recommends that customers look into using data models, report acceleration, or summary indexing when searching across hundreds of GBs of events in a single search. The searches provided here are a good starting point, but depending on your data, search time range, and other factors, more can be done to ensure that they scale appropriately.
||sourcetype=<payment processing data>||Search only your payment processing data.|
||eval _time=strptime(_time, "%Y/%m/%d %H:%M:%S")||Parse the time stamp into a UNIX time value.|
||sort _time||Sort the results from oldest to newest.|
||timechart count span=5m fixedrange=F||Graph the counts over time in 5-minute increments, expanding the chart as needed to cover all events.|