Hi Team,
Am using Splunk for the first time.
I need to calculate the average and Median for the field rate which is shown below.
Here's the sample output from my Splunk log:
Thu Dec 17 02:48:52 GMT+00:00 2015 [STATS] bucket-> 6 , 3795 , 25322 , 318 , 240 , 0
Thu Dec 17 02:48:52 GMT+00:00 2015 [STATS] rate-> 7123440
In the search text box, I am specifying the
index=<index_name> source=<source_name>
since the above mentioned pattern is not key=value, I am unable to calculate the average and median for it, but I cannot change the pattern since it is existing.
How to calculate the average and median of this field? Please kindly help.
Your timely intervention really helps me a lot.
Based on this rate field, I need to draw a time chart for every 15ms... It will be great if you can share the usage and steps.
... View more