Find requests source - ASP.NET Apps v4.0.30319\Request/sec

%3CLINGO-SUB%20id%3D%22lingo-sub-830855%22%20slang%3D%22en-US%22%3EFind%20requests%20source%20-%20ASP.NET%20Apps%20v4.0.30319%5CRequest%2Fsec%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-830855%22%20slang%3D%22en-US%22%3E%3CP%3EHello%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20an%20Alert%20Rule%20set%20based%20on%20Log%20Analytics%20query%20to%20check%20RPS%20for%20my%20SharePoint%20application%20VMs%3C%2FP%3E%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3CDIV%3E%3CDIV%3E%3CSPAN%3EIn%20last%20couple%20of%20days%20I%20have%20received%20a%20lot%20of%20emails%20from%20the%20alert%20rule%20that%20RPS%26gt%3B10%2C%20where%20in%20last%20months%20there%20were%20none.%20After%20quick%20check%20I%20have%20noticed%20that%20there%20are%20RPS%20between%20avg%2010-15%2C%20but%20today%20there%20was%20RPS%20avg%20value%20of%2030%20and%20after%20searching%20all%20entries%20I%20found%20two%20entries%20with%206551%20requests%20each.%26nbsp%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F129332iE900B3506AB7DB6A%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22clipboard_image_0.png%22%20title%3D%22clipboard_image_0.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3EI%20am%20trying%20to%20determine%20the%20source%20of%20those%20request%20and%20I%20stuck%20as%20I%20cannot%20find%20or%20build%20any%20log%20query%20with%20information%20I%20need.%26nbsp%3B%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3ECould%20you%20please%20help%20me%3F%3C%2FSPAN%3E%3C%2FDIV%3E%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-830855%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Log%20Analytics%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-832347%22%20slang%3D%22en-US%22%3ERe%3A%20Find%20requests%20source%20-%20ASP.NET%20Apps%20v4.0.30319%5CRequest%2Fsec%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-832347%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F400921%22%20target%3D%22_blank%22%3E%40BartKos%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIs%20this%20data%20in%20the%20Office%20table%3F%3C%2FP%3E%0A%3CDIV%3E%0A%3CDIV%3E%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3EOfficeActivity%0A%7C%20where%20OfficeWorkload%20%3D%3D%20%22SharePoint%22%20%3C%2FCODE%3E%3C%2FPRE%3E%3C%2FDIV%3E%0A%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%3E%3CSPAN%3Eor%20Somewhere%20else%2C%20perhaps%20you%20sharing%20your%20query%20'as%20is'%20will%20help%20us%20to%20help%20you%3F%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-833104%22%20slang%3D%22en-US%22%3ERe%3A%20Find%20requests%20source%20-%20ASP.NET%20Apps%20v4.0.30319%5CRequest%2Fsec%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-833104%22%20slang%3D%22en-US%22%3E%3CP%3EHello%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F239477%22%20target%3D%22_blank%22%3E%40Clive%20Watson%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHere%20is%20a%20query%20I%20am%20using%20to%20get%20avg%20requests%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3EPerf%0A%7C%20where%20(%20ObjectName%20%3D%3D%20%22ASP.NET%20Apps%20v4.0.30319%22%20)%0A%7C%20where%20CounterName%20%3D%3D%20%22Requests%2FSec%22%0A%7C%20where%20TimeGenerated%26gt%3B%20ago(15m)%0A%7C%20project%20TimeGenerated%2C%20Computer%2C%20RPS%3DCounterValue%0A%7C%20summarize%20AvgRpsLast15Minutes%3D%20avg(RPS)%20by%20Computer%0A%7C%20where%20AvgRpsLast15Minutes%20%26gt%3B%2010%3C%2FCODE%3E%3C%2FPRE%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20am%20monitoring%20those%20request%20to%20SharePoint%20Servers%20(SHP2013%20on%20WindowsServer%202012R2).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20do%20not%20have%20Office%20in%20my%20LogManagement%20so%20I%20got%20syntax%20error%20for%20the%20query%20you%20suggested%20to%20check.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-833145%22%20slang%3D%22en-US%22%3ERe%3A%20Find%20requests%20source%20-%20ASP.NET%20Apps%20v4.0.30319%5CRequest%2Fsec%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-833145%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F400921%22%20target%3D%22_blank%22%3E%40BartKos%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20now%20have%20two%20crucial%20pieces%20of%20info%2C%20you%20are%20using%20the%20%3CSTRONG%3EPERF%3C%2FSTRONG%3Etable%20and%20%3CSTRONG%3ERPS%3C%2FSTRONG%3Eis%20a%20column%20%3CU%3Eyou%3C%2FU%3Ehave%20defined%20that%20maps%20to%20%22Request%2FSec%22.%26nbsp%3B%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3EYour%20query%20if%20you%20don't%20run%20the%20final%20line%2C%20will%20show%20which%20computers%20have%20the%20spikes.%26nbsp%3B%20I%20would%20probably%20look%20to%20the%20%3CSTRONG%3EEvents%3C%2FSTRONG%3Etable%20(if%20you%20have%20it)%20and%20also%20check%20any%20system%20updates%20on%20those%20computers%20to%20see%20if%20a%20patch%20or%20change%20caused%20the%20spike.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20could%20use%20a%20query%20like%20this%20to%20see%20when%20the%20spikes%20first%20started%20or%20if%20there%20is%20a%20pattern%20(i.e.%20always%20on%20a%20Monday%20at%209am%20etc...)%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3EPerf%0A%7C%20where%20TimeGenerated%20%26gt%3B%20ago(7d)%0A%7C%20where%20Computer%20in%20(%22App04%22%2C%22App05%22)%20%20%2F%2F%20add%20in%20your%20computer%20names%20%0A%7C%20where%20ObjectName%20%3D%3D%20%22Processor%22%0A%7C%20where%20CounterName%20%3D%3D%20%22%25%20Processor%20Time%22%20and%20InstanceName%20%3D%3D%20%22_Total%22%0A%7C%20project%20TimeGenerated%2C%20Computer%2C%20RPS%3DCounterValue%0A%7C%20summarize%20AvgRpsLast15Minutes%3D%20avg(RPS)%20by%20bin(TimeGenerated%2C%201h)%2C%20Computer%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3ETest%20my%20query%20in%20the%20demo%20portal%2C%20just%20click%3A%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fportal.loganalytics.io%2FDemo%3Fq%3DH4sIAAAAAAAAA12PXUvDQBBF3%252FsrLgtCAoG2YPEpQvFBCn6EWnyVSXZMIt3dMLupVPzxboqu2qeFnXPPnalYXmefeO9YGLve8C1bFgqscQ1qXXal8zS%252FcWYYAwt6i0yth2FxqYrTu1I5MJ%252BDtJ6GRzcKmh%252FakmGPZHms37gJD%252FETZQlViWvYeyfqT89oYzAhF0jQaUcFshob6wPZhhP2snOB9pNmEDd1%252FD%252BoSPsX2FZP5XfLM%252B1Hjhk%252FGkPSfzDWh3Y7%252BDvyYbm6721M%252BBJ0aLOYylEfUfc2O1Mvu%252FzXH23CVsfTESLWdCQBsy%252BuC8WEawEAAA%253D%253D%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EGo%20to%20Log%20Analytics%20and%20Run%20Query%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F129632iA46DF3B08FD21C56%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22clipboard_image_0.png%22%20title%3D%22clipboard_image_0.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CBR%20%2F%3ENote%3A%20I've%20used%20Processor%2FCPU%20data%20as%20I%20don't%20have%20any%20asp.net%2C%20so%20please%20adjust%20lines%204%20and%205%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-833427%22%20slang%3D%22en-US%22%3ERe%3A%20Find%20requests%20source%20-%20ASP.NET%20Apps%20v4.0.30319%5CRequest%2Fsec%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-833427%22%20slang%3D%22en-US%22%3E%3CP%3EHello%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F239477%22%20target%3D%22_blank%22%3E%40Clive%20Watson%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20used%20your%20query%20(%20I%20just%20changed%20time%20bin%20to%2015%20minutes)%3C%2FP%3E%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3EPerf%0A%7C%20where%20(%20ObjectName%20%3D%3D%20%22ASP.NET%20Apps%20v4.0.30319%22%20)%0A%7C%20where%20CounterName%20%3D%3D%20%22Requests%2FSec%22%0A%7C%20project%20TimeGenerated%2C%20Computer%2C%20RPS%3DCounterValue%0A%7C%20summarize%20AvgRpsLast15Minutes%3D%20avg(RPS)%20by%20bin(TimeGenerated%2C%2015m)%2C%20Computer%0A%7C%20where%20AvgRpsLast15Minutes%20%26gt%3B%2010%3C%2FCODE%3E%3C%2FPRE%3E%3CP%3EI%20have%20got%20below%20result%20(for%20last%2048h)%3A%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20275px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F129648i119C28FCADEE1135%2Fimage-dimensions%2F275x213%3Fv%3D1.0%22%20width%3D%22275%22%20height%3D%22213%22%20alt%3D%22clipboard_image_0.png%22%20title%3D%22clipboard_image_0.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EI%20have%20checked%20Event%20tab%20for%20entries%20in%20the%20time%20of%20the%20occurrence%20of%20the%20one%20of%20spikes(nothing%20suspicious%20in%20my%20opinion%20which%20may%20cause%20such%20amount%20of%20requests)%2C%20below%20results%3A%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20307px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F129649i77404D06026B7181%2Fimage-dimensions%2F307x211%3Fv%3D1.0%22%20width%3D%22307%22%20height%3D%22211%22%20alt%3D%22clipboard_image_1.png%22%20title%3D%22clipboard_image_1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EI%20have%20not%20noticed%20any%20patterns%20for%20last%207%20days.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20there%20a%20possibility%20to%20check%20the%20source%20or%20details%20of%20all%20the%20requests%20from%20the%20spike%20like%20IP%20address%20or%20maybe%20the%20name%20of%20the%20internal%20process%20or%20computer%20name%3F%20I%20know%20there%20are%20hundreds%20of%20req%2Fs%20and%20it%20will%20require%20some%20digging%20but%20I%20would%20like%20to%20determine%20if%20there%20is%20some%20attack%20from%20outside%20(SharePoint%20app%20is%20dedicated%20for%20public%20users)%20or%20it%20is%20just%20some%20internal%20issue.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-833545%22%20slang%3D%22en-US%22%3ERe%3A%20Find%20requests%20source%20-%20ASP.NET%20Apps%20v4.0.30319%5CRequest%2Fsec%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-833545%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F400921%22%20target%3D%22_blank%22%3E%40BartKos%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20might%20see%20a%20high%20count%20of%20'something'%20in%20other%20tables%20at%20the%20same%20time%3F%26nbsp%3B%20Here%20I'm%20looking%20at%20all%20Tables%20in%20the%20workspace%20but%20excluding%20%22Perf%22%20(you%20might%20need%20that%20one%2C%20but%20its%20shows%20the%20method%20-%20alternative%20is%20to%20name%20the%20tables%20as%20per%20line%20%235).%26nbsp%3B%20I%20also%20supplied%20a%20time%20filter%20as%20your%20issues%20seems%20to%20be%20between%20two%20times%2C%20so%20we%20can%20filter%20out%20other%20data%20points%20with%20line%204.%26nbsp%3B%20Ideally%20with%20your%20first%20few%20queries%20you'll%20have%20a%20list%20of%20computers%20-%20adding%20just%20those%20at%20line%20%233%20will%20help%20filter%20away%20other%20computers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3Eunion%20isfuzzy%3Dtrue%20withsource%20%3D%20tt%20*%0A%7C%20where%20TimeGenerated%20%26gt%3B%20startofday(ago(7day))%20%20%2F%2F%20start%20from%20midnight%20%0A%2F%2F%7C%20where%20Computer%20in%20(%22App04%22%2C%22App05%22%2C%22App10%22)%20%20%2F%2F%20add%20in%20your%20computer%20names%20%0A%7C%20where%20TimeGenerated%20between%20(datetime('13%3A59%3A00')%20..%20datetime('17%3A00%3A00'))%20%20%0A%2F%2F%7C%20where%20tt%20in%20(%22Event%22%2C%20%22SecurityEvent%22)%0A%7C%20where%20tt%20!in(%22Perf%22)%0A%7C%20summarize%20count()%20by%20bin(TimeGenerated%2C%2015m)%2C%20tt%2C%20Computer%0A%7C%20sort%20by%20TimeGenerated%20asc%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%20%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDo%20the%20above%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fportal.loganalytics.io%2FDemo%3Fq%3DH4sIAAAAAAAAA3VQwUrEMBC9L%252Bw%252FjLlsKmW3Rcviwgoi4lXQH0ib6TaHJCWdWFr8eKctuvbgaZI38968edEZ78B0dRzH4UwhIvSGms7HUCGcgQhut5sv6BsMCB%252FG4is6DIpQwyN0pAL5WqtBqouXR34kCcDhsHSgDt6CNdqZS0Nw1Xn2to2EAYwDKZ7aNrsX6VyLpeaZWHSU1tPQwH6g%252BmE5ZbGD%252F2yVSD0iC2v%252BErfkLr87FQ%252BnLNslsN%252FDH%252FzI4IzztqseHz0be%252FlERyIF8Y5VDIaGBUhWkzfGSfGGoV7wLlqrghmR7UZHMoFygJJnViZTyAubpMxPf8OY2Z5TY8L6ItVVUzOg03z9ZL1qpni3m2%252FPFx2hvwEAAA%253D%253D%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EGo%20to%20Log%20Analytics%20and%20Run%20Query%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F129653i8B7E2A072B0C8591%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22clipboard_image_0.png%22%20title%3D%22clipboard_image_0.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EFrom%20the%20above%20graph%20we%20can%20hunt%20the%20next%20piece%2C%20we%20see%20that%20at%2014%3A00%20the%20%3CSTRONG%3EEvents%3C%2FSTRONG%3Eand%20%3CSTRONG%3ESecurityEvents%3C%2FSTRONG%3Eare%20high%20you%20could%20no%20do%20something%20like%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3EEvent%0A%7C%20where%20TimeGenerated%20%26gt%3B%20startofday(ago(1day))%20%20%2F%2F%20start%20from%20midnight%20%0A%7C%20where%20Computer%20in%20(%22App04%22%2C%22App05%22%2C%22App10%22)%20%20%2F%2F%20add%20in%20your%20computer%20names%20%0A%7C%20where%20TimeGenerated%20between%20(datetime('13%3A59%3A00')%20..%20datetime('15%3A00%3A00'))%20%20%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERepeat%20for%20the%20other%20tables.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
New Contributor

Hello,

 

I have an Alert Rule set based on Log Analytics query to check RPS for my SharePoint application VMs

 

In last couple of days I have received a lot of emails from the alert rule that RPS>10, where in last months there were none. After quick check I have noticed that there are RPS between avg 10-15, but today there was RPS avg value of 30 and after searching all entries I found two entries with 6551 requests each. 
clipboard_image_0.png
I am trying to determine the source of those request and I stuck as I cannot find or build any log query with information I need. 
 
Could you please help me?
5 Replies
Highlighted

@BartKos 

 

Is this data in the Office table?

OfficeActivity
| where OfficeWorkload == "SharePoint" 
 
or Somewhere else, perhaps you sharing your query 'as is' will help us to help you?
Highlighted

Hello @Clive Watson 

 

Here is a query I am using to get avg requests:

 

Perf
| where ( ObjectName == "ASP.NET Apps v4.0.30319" )
| where CounterName == "Requests/Sec"
| where TimeGenerated> ago(15m)
| project TimeGenerated, Computer, RPS=CounterValue
| summarize AvgRpsLast15Minutes= avg(RPS) by Computer
| where AvgRpsLast15Minutes > 10

 

I am monitoring those request to SharePoint Servers (SHP2013 on WindowsServer 2012R2).

 

I do not have Office in my LogManagement so I got syntax error for the query you suggested to check. 

Highlighted

Hi @BartKos 

 

We now have two crucial pieces of info, you are using the PERF table and RPS is a column you have defined that maps to "Request/Sec".  

Your query if you don't run the final line, will show which computers have the spikes.  I would probably look to the Events table (if you have it) and also check any system updates on those computers to see if a patch or change caused the spike.

 

You could use a query like this to see when the spikes first started or if there is a pattern (i.e. always on a Monday at 9am etc...)

Perf
| where TimeGenerated > ago(7d)
| where Computer in ("App04","App05")  // add in your computer names 
| where ObjectName == "Processor"
| where CounterName == "% Processor Time" and InstanceName == "_Total"
| project TimeGenerated, Computer, RPS=CounterValue
| summarize AvgRpsLast15Minutes= avg(RPS) by bin(TimeGenerated, 1h), Computer

Test my query in the demo portal, just click:
Go to Log Analytics and Run Query 


clipboard_image_0.png



Note: I've used Processor/CPU data as I don't have any asp.net, so please adjust lines 4 and 5

 

 

Highlighted

Hello @Clive Watson 

 

I have used your query ( I just changed time bin to 15 minutes)

Perf
| where ( ObjectName == "ASP.NET Apps v4.0.30319" )
| where CounterName == "Requests/Sec"
| project TimeGenerated, Computer, RPS=CounterValue
| summarize AvgRpsLast15Minutes= avg(RPS) by bin(TimeGenerated, 15m), Computer
| where AvgRpsLast15Minutes > 10

I have got below result (for last 48h):

clipboard_image_0.png

I have checked Event tab for entries in the time of the occurrence of the one of spikes(nothing suspicious in my opinion which may cause such amount of requests), below results:

clipboard_image_1.png

I have not noticed any patterns for last 7 days. 

 

Is there a possibility to check the source or details of all the requests from the spike like IP address or maybe the name of the internal process or computer name? I know there are hundreds of req/s and it will require some digging but I would like to determine if there is some attack from outside (SharePoint app is dedicated for public users) or it is just some internal issue. 

Highlighted

@BartKos 

 

You might see a high count of 'something' in other tables at the same time?  Here I'm looking at all Tables in the workspace but excluding "Perf" (you might need that one, but its shows the method - alternative is to name the tables as per line #5).  I also supplied a time filter as your issues seems to be between two times, so we can filter out other data points with line 4.  Ideally with your first few queries you'll have a list of computers - adding just those at line #3 will help filter away other computers.

 

 

union isfuzzy=true withsource = tt *
| where TimeGenerated > startofday(ago(7day))  // start from midnight 
//| where Computer in ("App04","App05","App10")  // add in your computer names 
| where TimeGenerated between (datetime('13:59:00') .. datetime('17:00:00'))  
//| where tt in ("Event", "SecurityEvent")
| where tt !in("Perf")
| summarize count() by bin(TimeGenerated, 15m), tt, Computer
| sort by TimeGenerated asc

 

   

Do the above, Go to Log Analytics and Run Query



clipboard_image_0.png

From the above graph we can hunt the next piece, we see that at 14:00 the Events and SecurityEvents are high you could no do something like

 

 

Event
| where TimeGenerated > startofday(ago(1day))  // start from midnight 
| where Computer in ("App04","App05","App10")  // add in your computer names 
| where TimeGenerated between (datetime('13:59:00') .. datetime('15:00:00'))  

 

 

Repeat for the other tables.