Splunk Search

Getting average times for user defined categories

RVDowning
Contributor

stats count as #PlanOpen,
count(eval(NumRows < 50)) as SmallPlans ,
count(eval(NumRows>=50 AND NumRows <200)) as MediumPlans,
count(eval(NumRows >=200)) as LargePlans

With a query such as above and a field SecsElapsed in each row, is there a way to get the average of that field for each category, namely SmallPlans, MediumPlans and LargePlans?

Tags (2)
0 Karma

RVDowning
Contributor

Have no idea if that is what you meant or not.

0 Karma

cpeteman
Contributor

Can you change this so the code is formatted please? Thanks 🙂

0 Karma

RVDowning
Contributor

Ok, I think I have this. I was just in syntax hell.

0 Karma
Get Updates on the Splunk Community!

Deep Dive into Federated Analytics: Unlocking the Full Power of Your Security Data

In today’s complex digital landscape, security teams face increasing pressure to protect sprawling data across ...

Your summer travels continue with new course releases

Summer in the Northern hemisphere is in full swing, and is often a time to travel and explore. If your summer ...

From Alert to Resolution: How Splunk Observability Helps SREs Navigate Critical ...

It's 3:17 AM, and your phone buzzes with an urgent alert. Wire transfer processing times have spiked, and ...