Splunk Search

How to calculate average of response time in seconds

Madhusri
Engager

Hi,

I need to calculate average of response time in seconds for my application.

 

Query i am using

index="prod*_ping*"  source="*splunk-audit.log" "event=SSO" connectionid=*
| stats avg(responsetime) as AvgRespTimeInSec by connectionid

In connectionid i will get the application details

Madhusri_0-1630643120981.png

Please let me know whether my query is correct for calculating the average of response time in seconds?

 

Regards,

Madhusri R

 

 

Labels (1)
Tags (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Of course it depends on your data whether it makes sense or not but in general, | stats avg(field) is indeed the way to calculate average of field values.

0 Karma

Madhusri
Engager

Thanks @PickleRick 

Then the average of my response time is calculating in seconds right?

 

Regards,

Madhu R

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Depends on your source data. If the field itself is measured in seconds then the average of the values in that field will be also in seconds.

Otherwise you might want to use eval to multiply or divide the value to other unit.

0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...