<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to calculate rate of change over time for an variable in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-calculate-rate-of-change-over-time-for-an-variable/m-p/63132#M15592</link>
    <description>&lt;P&gt;I have an input value that changes steadily (at constant rate, either increasing or decreasing), and Splunk is capturing every value with a timestamp.&lt;/P&gt;

&lt;P&gt;I am trying to find a way to calculate the acceleration of this input, which is the rate of change over time.&lt;BR /&gt;
Ideally, I would like to trigger an alert if a threshold in this rate of change is reached.&lt;/P&gt;

&lt;P&gt;Any smooth changes in the velocity are fine, but abrupt changes (speed up, slow down larger than some threshold) should trigger an alarm, or at least should be visible in a Splunk graph for analysis against other kind of time based data for event correlation analysis.&lt;/P&gt;

&lt;P&gt;Mathematically, the problem should be simple: Acceleration is the second derivative of a function.&lt;BR /&gt;
However, it is difficult to model a function (much less find the derivatives) from just raw data.&lt;/P&gt;

&lt;P&gt;I might be over-thinking this, therefore I'm reaching out to other splunkers for ideas.&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Thu, 13 Jun 2013 18:56:09 GMT</pubDate>
    <dc:creator>mflamerich</dc:creator>
    <dc:date>2013-06-13T18:56:09Z</dc:date>
    <item>
      <title>How to calculate rate of change over time for an variable</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-calculate-rate-of-change-over-time-for-an-variable/m-p/63132#M15592</link>
      <description>&lt;P&gt;I have an input value that changes steadily (at constant rate, either increasing or decreasing), and Splunk is capturing every value with a timestamp.&lt;/P&gt;

&lt;P&gt;I am trying to find a way to calculate the acceleration of this input, which is the rate of change over time.&lt;BR /&gt;
Ideally, I would like to trigger an alert if a threshold in this rate of change is reached.&lt;/P&gt;

&lt;P&gt;Any smooth changes in the velocity are fine, but abrupt changes (speed up, slow down larger than some threshold) should trigger an alarm, or at least should be visible in a Splunk graph for analysis against other kind of time based data for event correlation analysis.&lt;/P&gt;

&lt;P&gt;Mathematically, the problem should be simple: Acceleration is the second derivative of a function.&lt;BR /&gt;
However, it is difficult to model a function (much less find the derivatives) from just raw data.&lt;/P&gt;

&lt;P&gt;I might be over-thinking this, therefore I'm reaching out to other splunkers for ideas.&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2013 18:56:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-calculate-rate-of-change-over-time-for-an-variable/m-p/63132#M15592</guid>
      <dc:creator>mflamerich</dc:creator>
      <dc:date>2013-06-13T18:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to calculate rate of change over time for an variable</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-calculate-rate-of-change-over-time-for-an-variable/m-p/63133#M15593</link>
      <description>&lt;P&gt;If you are talking about a steady increase/decrease (not acceleration) &lt;CODE&gt;delta&lt;/CODE&gt; would be a good option. &lt;/P&gt;

&lt;P&gt;If you are talking about acceleration/deceleration hmm .. perhaps  would be something that you can work on.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;... | streamstats window=X stdev(your_field) as Y&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Large values of Y would indicate that there has been a significant change, and that the current value of &lt;CODE&gt;your_field&lt;/CODE&gt; is different from the previous X number of values.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/5.0.3/SearchReference/CommonStatsFunctions"&gt;http://docs.splunk.com/Documentation/Splunk/5.0.3/SearchReference/CommonStatsFunctions&lt;/A&gt;&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/5.0.3/SearchReference/Streamstats"&gt;http://docs.splunk.com/Documentation/Splunk/5.0.3/SearchReference/Streamstats&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2013 21:30:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-calculate-rate-of-change-over-time-for-an-variable/m-p/63133#M15593</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-06-13T21:30:34Z</dc:date>
    </item>
  </channel>
</rss>

