Splunk Search

How to write a search to graph average time by site specific location using my sample data?

XtC
Engager

I'm trying to graph the average time of an event:

July 18, 2016 10:02 -> INFO -> Done with sync of project-high-med-2016-spf-1-0_amss_standard_oem_milestone to eurdc of 272 MB in 20.29167366027832 seconds

July 18, 2016 08:16 -> INFO -> Done with sync of shenzhen-hipad-telecommunication-technology-co-ltd/msm8909-la-1-1_amss_oem_milestone-major to tw of 24 MB in 14.404675483703613 seconds

So I want to display the results of average time per region:
eurdc= x seconds
tw= x seconds

Any suggestions?

0 Karma

Raschko
Communicator

Try this:

yoursearch | rex "to\s(?<loghost>\w+)\sof\s\d+\sMB\sin\s(?<seconds>\d+\.\d+)\sseconds" | stats avg(seconds) by loghost

XtC
Engager

Seems to be working, can you explain a little bit the way to form the expression?

0 Karma

Raschko
Communicator

The rex command is just extracting the needed fields loghost and seconds from the event logs.

Afterwards the stats command is calculating the needed average (avg) of seconds by loghost.

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...