Splunk Search

How to edit my timechart search to only return results where the (average) response time is greater than 500?

marees123
Path Finder

Hi All,

I'm using the search below for getting the avg response time that is greater than 500.

index=web <data> | timechart avg(api-response-time)

I'm getting results, but I would like to get the results where response time value is greater than 500.

Please help/

0 Karma
1 Solution

aljohnson_splun
Splunk Employee
Splunk Employee

So if you want to filter so that you have an average of all response times that were initally over 500, you'd have:

index=web <data> api-response-time>500
| timechart avg(api-response-time)

If you want to filter so that you have averages of all response times, and only retain the averages that are over 500, you'd have:

index=web <data>
| timechart avg(api-response-time) as average
| where average > 500

View solution in original post

aljohnson_splun
Splunk Employee
Splunk Employee

So if you want to filter so that you have an average of all response times that were initally over 500, you'd have:

index=web <data> api-response-time>500
| timechart avg(api-response-time)

If you want to filter so that you have averages of all response times, and only retain the averages that are over 500, you'd have:

index=web <data>
| timechart avg(api-response-time) as average
| where average > 500

marees123
Path Finder

Hi AlJohnson...

Thanks for the query.. It worked as expected...

Thanks again 🙂

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...