Splunk Search

How do I filter based on average over time

huan_an
Explorer
query 
| bin _time span=30m
| chart avg(throughput) by _time server

Hi, I want only the avg(throughput) by _time server values that exceed a certain number to be shown. I tried multiple different ways and came up with broken queries/queries that return empty results like the following:

# broken query
| where avg(throughput) by _time server > 80
# no results found
| search avg(throughput) by _time server > 80
# broken query
| rename avg(throughput) by _time server as avgthroughput
| where avgthroughput > 80

Would appreciate suggestions! Thank you.

P.S. Splunk beginner

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Does something like this work for you?

query 
| bin _time span=30m 
| stats avg(throughput) as avgthroughput by _time server
| where avgthroughput > 80
| xyseries _time server avgthroughput

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Does something like this work for you?

query 
| bin _time span=30m 
| stats avg(throughput) as avgthroughput by _time server
| where avgthroughput > 80
| xyseries _time server avgthroughput
Get Updates on the Splunk Community!

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...

Application management with Targeted Application Install for Victoria Experience

Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...