Splunk Search

display average hits per minute for each hour for a time range

jrich523
Path Finder

how do i show the average number of hits per minute for each hour?

basically i have a system that will, on peak hours, get between 60-80 hits a minute. what i'd like to see is for each hour (11am-12pm) show what the average hits/min is. sort of a nested average i guess.. and then show that for a day.

i wasnt even really sure what field to average so im not really off to a good start

Thanks

Tags (2)
1 Solution

gkanapathy
Splunk Employee
Splunk Employee

I'm assuming that your log data contains one entry per hit? If so, you can just do:

sourcetype=whatever | timechart span=1h count | eval hpm=count/60

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee

I'm assuming that your log data contains one entry per hit? If so, you can just do:

sourcetype=whatever | timechart span=1h count | eval hpm=count/60
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...