Splunk Search

How can I overlay the 7 day, 30 day or 90 day average line over the timechart?

dmbrcx
Explorer

Dumb question I cannot find a simple answer to. 🤣

If I run a simple timechart search for 7 days, 30 days or 90 days --

How can I overlay the 7 day, 30 day or 90 day average line over the timechart?

For example:

 

 

index=blah sourcetype=blah filter_term=blah
| timechart span=1d count as daily_count

 

 

dmbrcx_0-1667877663591.png

 

Labels (1)
0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

Add this to the end

| eventstats avg(daily_count) as average

View solution in original post

bowesmana
SplunkTrust
SplunkTrust

Add this to the end

| eventstats avg(daily_count) as average

dmbrcx
Explorer

Thank you sir

0 Karma

bowesmana
SplunkTrust
SplunkTrust

and if you have a split by clause and you want an average of the total for a day, then use

| addtotals
| eventstats avg(Total) as average
| fields - Total
0 Karma
Get Updates on the Splunk Community!

Dashboard Studio Challenge - Learn New Tricks, Showcase Your Skills, and Win Prizes!

Reimagine what you can do with your dashboards. Dashboard Studio is Splunk’s newest dashboard builder to ...

Introducing Edge Processor: Next Gen Data Transformation

We get it - not only can it take a lot of time, money and resources to get data into Splunk, but it also takes ...

Take the 2021 Splunk Career Survey for $50 in Amazon Cash

Help us learn about how Splunk has impacted your career by taking the 2021 Splunk Career Survey. Last year’s ...