Splunk Search
Highlighted

Timechart with events/h and average events per hour

Communicator

Hello,

I want to create a timechart that shows the amount of events per hour in the last 24 hours,
and a line in it that shows the average events per hour of the last 5 days. So far I'm stuck with this:

index=test ACTION=RECEIVE | eval events=1 | timechart span=1h sum(events)

How can I calculate the average events per hour of the last n-days and add it in that chart?
Any help is highly appreciated!

0 Karma
Highlighted

Re: Timechart with events/h and average events per hour

Contributor

Hello, ckunath

May be it is not optimal query but hope help you solve your task

index=test ACTION=RECEIVE earliest=-24h | eval events=1 | timechart span=1h sum(events) as T | eval tempfield="fieldforjoin"
| join temp
field [search index=test ACTION=RECEIVE earliest=-5d | eval events=1 | stats count(events) as Counthourmday by datehour datemday
| stats avg( Counthourmday) as avgevents | eval tempfield="fieldforjoin" ]

View solution in original post

0 Karma