Splunk Search

Is it possible, within the same search, to find the count of events where the transaction duration is greater than and less than the average?

vamshi245
New Member

I am trying to get the count of events where the transaction duration is above the average duration and below the average duration.

below is my search to find out the count of events above the average transaction duration:

index=whatever*  sourcetype="Source"  "COMPONENTNAME=X" AND "EVENT=Received"|eval receivedtime=SERVER_TIME |join type=inner ORDERNUMBER max=0[search index=tas_prod  sourcetype="TAS:FUSION:ProdSupport:PRD:AuditDB"  "COMPONENTNAME=Y" AND "EVENT=Delivered"|eval deliveredTime=SERVER_TIME ]|eval diff = deliveredTime-receivedtime| eventstats avg(diff) as Avg | where diff>Avg| stats count as Grt

is it possible to get the count of transactions with diff < Avg in the same search? like:

searchStatement|eval diff = deliveredTime-receivedtime| eventstats avg(diff) as Avg | where diff>Avg| stats count as Grt | where diff < Avg |stats count as Lsr

please let me know if i can combine the count without using the same search statement another time to find the count for less than average

0 Karma
1 Solution

sundareshr
Legend

You could try this

.... | stats count(eval(diff>Avg)) as Grt count(eval(diff<Avg)) as Lsr

View solution in original post

0 Karma

sundareshr
Legend

You could try this

.... | stats count(eval(diff>Avg)) as Grt count(eval(diff<Avg)) as Lsr
0 Karma

vamshi245
New Member

thanks this worked.

0 Karma
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...