Splunk Search

How to calculate average of response time in seconds

Madhusri
Engager

Hi,

I need to calculate average of response time in seconds for my application.

 

Query i am using

index="prod*_ping*"  source="*splunk-audit.log" "event=SSO" connectionid=*
| stats avg(responsetime) as AvgRespTimeInSec by connectionid

In connectionid i will get the application details

Madhusri_0-1630643120981.png

Please let me know whether my query is correct for calculating the average of response time in seconds?

 

Regards,

Madhusri R

 

 

Labels (1)
Tags (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Of course it depends on your data whether it makes sense or not but in general, | stats avg(field) is indeed the way to calculate average of field values.

0 Karma

Madhusri
Engager

Thanks @PickleRick 

Then the average of my response time is calculating in seconds right?

 

Regards,

Madhu R

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Depends on your source data. If the field itself is measured in seconds then the average of the values in that field will be also in seconds.

Otherwise you might want to use eval to multiply or divide the value to other unit.

0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...