Splunk Search

How do I display the average processing time after the total count?

ten_yard_fight
Path Finder

Fellow Splunkers, I have a chart that displays my Apache processing times as such

Seconds     count
0           191952
1           3494
2           408
3- 5        3429
5- 10       277
10- 20      294
20- 60      95   
60-120      13   
120-300     23   
300-600     3

The search command is a simple

index="log_index" | eval LatencyRanges=case(seconds=0, "0 sec", seconds=1, "1 sec", etc., etc.) | stats count by LatencyRanges

What can I use after this to display the Average Second for the Total count as my last field?
Any feedback is greatly appreciated. Thanks.

0 Karma

ten_yard_fight
Path Finder

for anyone interested in using a search similar to mine for getting avg response time.

...| eval seconds=spent*1.0e-6 | eventstats avg(seconds) AS Avg_Response_time_in_sec | eval Avg_Response_time_in_sec=round(Avg_Response_time_in_sec, 0) | chart count AS #Requests by Avg_Response_time_in_sec

So it take processing time in microseconds and converts to seconds, does an average of the total count of seconds and puts into the Avg_Response_time_in_sec field, then charts it out...

0 Karma

jonuwz
Influencer
... | eventstats avg(count) as avg_count
0 Karma

ten_yard_fight
Path Finder

Thanks for replying. I finally got around to playing with this one. I tweaked it a little but I got the concept.

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...