Splunk Search

Aggregate stats functions

Marco
Communicator

Hi folks,

host=* AlertType="Warning" |bucket _time span=day| stats count min(count) max(count)  avg(countstdev(count) by _time

This is what the results look like:

_time count min(count) max(count) avg(count) stdev(count)

_timecountminmaxavgstdev
2020-08-0571    
2020-08-06109    
2020-08-07282    
2020-08-0844    
2020-08-0945    
2020-08-1036    

 

 

I get the other columns blank, I want the query to return the Min, Max, Avg, and STD from the data in the Count column

Thank you,

Marco

Labels (6)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

count doesn't have a value until the first stats completes

host=* AlertType="Warning" |bucket _time span=day
| stats count by _time
| stats min(count) max(count) avg(count) stdev(count)

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

count doesn't have a value until the first stats completes

host=* AlertType="Warning" |bucket _time span=day
| stats count by _time
| stats min(count) max(count) avg(count) stdev(count)
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...