Splunk Search

How can I overlay the 7 day, 30 day or 90 day average line over the timechart?

dmbrcx
Explorer

Dumb question I cannot find a simple answer to. 🤣

If I run a simple timechart search for 7 days, 30 days or 90 days --

How can I overlay the 7 day, 30 day or 90 day average line over the timechart?

For example:

 

 

index=blah sourcetype=blah filter_term=blah
| timechart span=1d count as daily_count

 

 

dmbrcx_0-1667877663591.png

 

Labels (1)
0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

Add this to the end

| eventstats avg(daily_count) as average

View solution in original post

bowesmana
SplunkTrust
SplunkTrust

Add this to the end

| eventstats avg(daily_count) as average

dmbrcx
Explorer

Thank you sir

0 Karma

bowesmana
SplunkTrust
SplunkTrust

and if you have a split by clause and you want an average of the total for a day, then use

| addtotals
| eventstats avg(Total) as average
| fields - Total
0 Karma
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...