Splunk Search

Aggregate stats functions

Marco
Communicator

Hi folks,

host=* AlertType="Warning" |bucket _time span=day| stats count min(count) max(count)  avg(countstdev(count) by _time

This is what the results look like:

_time count min(count) max(count) avg(count) stdev(count)

_timecountminmaxavgstdev
2020-08-0571    
2020-08-06109    
2020-08-07282    
2020-08-0844    
2020-08-0945    
2020-08-1036    

 

 

I get the other columns blank, I want the query to return the Min, Max, Avg, and STD from the data in the Count column

Thank you,

Marco

Labels (6)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

count doesn't have a value until the first stats completes

host=* AlertType="Warning" |bucket _time span=day
| stats count by _time
| stats min(count) max(count) avg(count) stdev(count)

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

count doesn't have a value until the first stats completes

host=* AlertType="Warning" |bucket _time span=day
| stats count by _time
| stats min(count) max(count) avg(count) stdev(count)
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...