Splunk Search

Adding an event field to Stats Min command

petem3
New Member

When calculating a minimum value across events how can you then retain an event field related to the minimum value and display the minimum value with the event field?   

Labels (1)
0 Karma

thambisetty
SplunkTrust
SplunkTrust
| eventstats min(field) as min_field
| where field=min_field
| table _time, field
————————————
If this helps, give a like below.
0 Karma

petem3
New Member

I am trying to show the event date related to the min field value, along with the minimum value. 

0 Karma

richgalloway
SplunkTrust
SplunkTrust

It would help to see your current query, but I think you want to try the eventstats command.

---
If this reply helps you, Karma would be appreciated.
0 Karma

thambisetty
SplunkTrust
SplunkTrust

eventstats 

| eventstats min(fieldname) 

https://youtu.be/vq3h9Qo5UPY

————————————
If this helps, give a like below.
0 Karma
Get Updates on the Splunk Community!

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

New Release | Splunk Cloud Platform 10.1.2507

Hello Splunk Community!We are thrilled to announce the General Availability of Splunk Cloud Platform 10.1.2507 ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...