<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Top avg latencies by IP in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Top-avg-latencies-by-IP/m-p/117813#M31387</link>
    <description>&lt;P&gt;I am attempting to get the top offenders of average latency, by their client IP, but limited to the top 50 results, sorted by their latency. This is the search that I have, but I can't figure our why it doesn't return any results. If I remove the 'top' command from the below query, it returns results, but it returns all of them, which isn't as helpful. &lt;/P&gt;

&lt;P&gt;sourcetype=www NOT hck=* | stats avg(timetaken) by _time,clientip | top timetaken&lt;/P&gt;

&lt;P&gt;any suggestions would be great! Thank you! &lt;/P&gt;</description>
    <pubDate>Mon, 28 Oct 2013 15:09:35 GMT</pubDate>
    <dc:creator>tmarlette</dc:creator>
    <dc:date>2013-10-28T15:09:35Z</dc:date>
    <item>
      <title>Top avg latencies by IP</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Top-avg-latencies-by-IP/m-p/117813#M31387</link>
      <description>&lt;P&gt;I am attempting to get the top offenders of average latency, by their client IP, but limited to the top 50 results, sorted by their latency. This is the search that I have, but I can't figure our why it doesn't return any results. If I remove the 'top' command from the below query, it returns results, but it returns all of them, which isn't as helpful. &lt;/P&gt;

&lt;P&gt;sourcetype=www NOT hck=* | stats avg(timetaken) by _time,clientip | top timetaken&lt;/P&gt;

&lt;P&gt;any suggestions would be great! Thank you! &lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2013 15:09:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Top-avg-latencies-by-IP/m-p/117813#M31387</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2013-10-28T15:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: Top avg latencies by IP</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Top-avg-latencies-by-IP/m-p/117814#M31388</link>
      <description>&lt;P&gt;A few things;&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;top&lt;/CODE&gt; count occurrences, not high/low values. &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;stats&lt;/CODE&gt; removes all the other fields, so after that you only have &lt;CODE&gt;_time&lt;/CODE&gt;, &lt;CODE&gt;clientip&lt;/CODE&gt; and &lt;CODE&gt;avg(timetaken)&lt;/CODE&gt;. &lt;/P&gt;

&lt;P&gt;Suggest the following;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=www NOT hck=* | stats avg(timetaken) as TT by _time,clientip | stats max(TT) as XXXX by clientip | sort - XXXX | head 50 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;/K&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2013 15:43:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Top-avg-latencies-by-IP/m-p/117814#M31388</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-10-28T15:43:52Z</dc:date>
    </item>
  </channel>
</rss>

