Dashboards & Visualizations

How to create a single timechart to show the trend of time latency for each case in my sample data?

raindrop18
Communicator

I have these 9 cases and have a transaction timestamp. I have a field for the timestamp time-spent which is giving me the the time value (20 sec).

I would like to create one search/chart to show the trend for each case time latency. I have created multiple charts, but I assume there is a better way to create one optimized search.

Get contact is 50 sec
Moving File is 20 sec
Get Folder Information is 10 sec
Moving file items is 4 sec
Settings flags for file item is 8 sec
header counts for file is 2 sec
Get file Information is 3 sec
Authenticating Users is 5 sec
Transaction time for site login is 4 sec

Tags (2)
1 Solution

woodcock
Esteemed Legend

I assume you have a field for operation or similar so you can just do this:

... | timechart span=5m avg(time-spent) BY operation

View solution in original post

woodcock
Esteemed Legend

I assume you have a field for operation or similar so you can just do this:

... | timechart span=5m avg(time-spent) BY operation

raindrop18
Communicator

thanks much. it works.

0 Karma
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...