Splunk Search

How to create a timechart search for the average of a field between two date ranges?

chrispappo
Explorer

Hi,

I have 4 dates (format mm/dd/yyyy)

start 1: 01/01/2016 end 1: 01/07/2016
Start 2: 02/01/2016 end 2: 02/07/2016

In these two ranges, I'm looking for the logs with the field delta (which is a numeric field). At the end, I would like a result like this:

date           avg(detlta)
01/07/2016     0.4
02/07/2016     0.1

I'm thinking about doing a search like this:

index=rs action  latest="01/07/2016:00:00:00" earliest="01/01/2016:00:00:00"  | append [search index=rs action  latest="02/07/2016:00:00:00" earliest="02/01/2016:00:00:00"] | timechart  avg(delta) 

but this request is very long and does not really result in what I'm looking for. Does anyone know a better solution?

thanks

Tags (4)
0 Karma

somesoni2
Revered Legend

Try this

 index=rs action  latest="01/07/2016:00:00:00" earliest="01/01/2016:00:00:00"  | stats avg(delta) | eval _time=strptime("01/01/2016","%m/%d/%Y") | append [search index=rs action  latest="02/07/2016:00:00:00" earliest="02/01/2016:00:00:00" | stats avg(delta) | eval _time=strptime("02/01/2016","%m/%d/%Y") ] 
0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...