Splunk Search

Aggregate stats functions

Marco
Communicator

Hi folks,

host=* AlertType="Warning" |bucket _time span=day| stats count min(count) max(count)  avg(countstdev(count) by _time

This is what the results look like:

_time count min(count) max(count) avg(count) stdev(count)

_timecountminmaxavgstdev
2020-08-0571    
2020-08-06109    
2020-08-07282    
2020-08-0844    
2020-08-0945    
2020-08-1036    

 

 

I get the other columns blank, I want the query to return the Min, Max, Avg, and STD from the data in the Count column

Thank you,

Marco

Labels (7)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

count doesn't have a value until the first stats completes

host=* AlertType="Warning" |bucket _time span=day
| stats count by _time
| stats min(count) max(count) avg(count) stdev(count)

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

count doesn't have a value until the first stats completes

host=* AlertType="Warning" |bucket _time span=day
| stats count by _time
| stats min(count) max(count) avg(count) stdev(count)
Get Updates on the Splunk Community!

Join Us at the Builder Bar at .conf24 – Empowering Innovation and Collaboration

What is the Builder Bar? The Builder Bar is more than just a place; it's a hub of creativity, collaboration, ...

Combine Multiline Logs into a Single Event with SOCK - a Guide for Advanced Users

This article is the continuation of the “Combine multiline logs into a single event with SOCK - a step-by-step ...

Everything Community at .conf24!

You may have seen mention of the .conf Community Zone 'round these parts and found yourself wondering what ...