Splunk Search

Frequency of events - how often an event was logged

Derek
Path Finder

Does anyone have a good way (or am I missing the something obvious?) of calculating for a defined time range the average frequency of the events logged?

Such as eventtype A appeared every X minutes.

Thanks!

Tags (1)
0 Karma
1 Solution

Simeon
Splunk Employee
Splunk Employee

I would use eval in combination with stats. For example:

sourcetype=apache_error earliest=-60m | stats count as total | eval errors_per_min=(total/60) | fields error_per_min

This would take the total # of events over the past 60 minutes, then divide by 60 to get you a count per minute. Or from the advanced charting view:

sourcetype=apache_error earliest=-60m | timechart span=1m count as error_per_min 

View solution in original post

Simeon
Splunk Employee
Splunk Employee

I would use eval in combination with stats. For example:

sourcetype=apache_error earliest=-60m | stats count as total | eval errors_per_min=(total/60) | fields error_per_min

This would take the total # of events over the past 60 minutes, then divide by 60 to get you a count per minute. Or from the advanced charting view:

sourcetype=apache_error earliest=-60m | timechart span=1m count as error_per_min 

Derek
Path Finder

I knew I missing something obvious 🙂

0 Karma
Get Updates on the Splunk Community!

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...