Splunk Search

average calculation

zacksoft
Contributor

sourcetype="MATIZ" host=A OR host=B or host=C
| base search
| timechart span=1d eval(round(avg(response_time),2)) by host

with a search preset for 'last 30 days'

Our system comprises of three hosts. Using the above query gives me average response_time by each host. But I don't want that.
I want the visualization of simple moving average of response time of the entire system as a whole, not by each host.

A Trendline would help.

Need assistance here.
Thank you.

Tags (1)
0 Karma

adonio
Ultra Champion

hello there,

try trendline or streamstats check out the following answers:
https://answers.splunk.com/answers/189759/how-to-calculate-moving-average-and-graph-it-as-an.html
https://answers.splunk.com/answers/554522/what-is-the-best-way-to-get-the-running-average-an.html
https://answers.splunk.com/answers/542213/moving-average-query.html
you can try and remove you by host clause to get the "system as a whole" or use a function that present your idea of "system as a whole"

hope it helps

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...