Splunk Search

How to create Splunk search for getting average of max per 10mins?

New Member

Hi team

I am trying to create a query in order to get average of all max values in a period of 10 mins for any selected time range. (7 days) per host.

There are multiple hosts and searching a log text in splunk. Then using the log events count I am trying to figure out how many times did the event occurred/ host was called. 

For my query I want to take average of all the max values  per 10 min period over the selected time-range per host.


Labels (2)
Tags (1)
0 Karma


to get a rolling 10 minute figure, you will need streamstats, but to get a static 10 minute average you can use bin/stats, e.g. see this example which simply calculates the time diff between every event. It then buckets time per 10 minutes then takes the max value of diff and finally takes the average of that value

| delta _time as diff
| eval diff=-diff
| bin _time span=10m
| stats max(diff) as diff by _time host
| stats avg(diff) by host

 Hopefully you can fit that to your requirement

0 Karma
Get Updates on the Splunk Community!

Tips & Tricks When Using Ingest Actions

Tune in to learn about:Large scale architecture when using Ingest ActionsRegEx performance considerations ...

Announcing Our Splunk MVPs

We are excited to announce the first cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Dashboard Studio Challenge - Learn New Tricks, Showcase Your Skills, and Win Prizes!

Reimagine what you can do with your dashboards. Dashboard Studio is Splunk’s newest dashboard builder to ...