Splunk Search

How to get an average from this search?

kvanwagoner
New Member

I'm using the following search which I have working in a dashboard.

"A PUT was made to OpenAAA API - Status: OK"
| spath AppID | search AppID=200296 Environment=prod | timechart count by Environment|

It displays the # of events for each day without issue.

But how can I get the average # of events for the same 7-day time frame?

Any help would be greatly appreciated!

0 Karma
1 Solution

harshpatel
Contributor

Hi @kvanwagoner,

You can provide span value in the timechart command to have it display count over 7 day period.

For example:

"A PUT was made to OpenAAA API - Status: OK" | spath AppID | search AppID=200296 Environment=prod | timechart span=7d count by Environment

Splunk Doc: Timechart Bin Options

View solution in original post

0 Karma
Get Updates on the Splunk Community!

Index This | I am a number, but when you add ‘G’ to me, I go away. What number am I?

March 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

What’s New in Splunk App for PCI Compliance 5.3.1?

The Splunk App for PCI Compliance allows customers to extend the power of their existing Splunk solution with ...

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...