Splunk Search

How to calculate average of response time in seconds

Madhusri
Engager

Hi,

I need to calculate average of response time in seconds for my application.

 

Query i am using

index="prod*_ping*"  source="*splunk-audit.log" "event=SSO" connectionid=*
| stats avg(responsetime) as AvgRespTimeInSec by connectionid

In connectionid i will get the application details

Madhusri_0-1630643120981.png

Please let me know whether my query is correct for calculating the average of response time in seconds?

 

Regards,

Madhusri R

 

 

Labels (1)
Tags (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Of course it depends on your data whether it makes sense or not but in general, | stats avg(field) is indeed the way to calculate average of field values.

0 Karma

Madhusri
Engager

Thanks @PickleRick 

Then the average of my response time is calculating in seconds right?

 

Regards,

Madhu R

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Depends on your source data. If the field itself is measured in seconds then the average of the values in that field will be also in seconds.

Otherwise you might want to use eval to multiply or divide the value to other unit.

0 Karma
Get Updates on the Splunk Community!

Enter the Splunk Community Dashboard Challenge for Your Chance to Win!

The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ...

.conf24 | Session Scheduler is Live!!

.conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...