Splunk Search

Aggregate stats functions

Marco
Communicator

Hi folks,

host=* AlertType="Warning" |bucket _time span=day| stats count min(count) max(count)  avg(countstdev(count) by _time

This is what the results look like:

_time count min(count) max(count) avg(count) stdev(count)

_timecountminmaxavgstdev
2020-08-0571    
2020-08-06109    
2020-08-07282    
2020-08-0844    
2020-08-0945    
2020-08-1036    

 

 

I get the other columns blank, I want the query to return the Min, Max, Avg, and STD from the data in the Count column

Thank you,

Marco

Labels (7)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

count doesn't have a value until the first stats completes

host=* AlertType="Warning" |bucket _time span=day
| stats count by _time
| stats min(count) max(count) avg(count) stdev(count)

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

count doesn't have a value until the first stats completes

host=* AlertType="Warning" |bucket _time span=day
| stats count by _time
| stats min(count) max(count) avg(count) stdev(count)
Get Updates on the Splunk Community!

New Case Study Shows the Value of Partnering with Splunk Academic Alliance

The University of Nevada, Las Vegas (UNLV) is another premier research institution helping to shape the next ...

How to Monitor Google Kubernetes Engine (GKE)

We’ve looked at how to integrate Kubernetes environments with Splunk Observability Cloud, but what about ...

Index This | How can you make 45 using only 4?

October 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...