Run a search in the metrics index over the last 15 minutes. Use the stats command to find the middle number, the average and the most frequent occurrence of the field called "UsedBytes". Use an 'as' clause to rename all your fields. Split by users. Add column totals, customize your totals label, and place it underneath the user column. Finally, ONLY evaluate UseBytes that are MORE THAN the value of 0.
My string didnt work (index=metrics | stats mode(UsedBytes), avg(UsedBytes), median(UsedBytes) as Bytes
I am new to Splunk and need some assitance.
I'm sorry.
| tstats mode(UsedBytes), avg(UsedBytes), median(UsedBytes) as Bytes sum(UsedBytes) as totals where index=metrics by user
Doesnt run.