Splunk Search

Average of different field values

tunix
New Member

Hi There

I want a simple table-view, with following information:
Name of different views, how often they were requestet per month (average).

My search is looking like this:

index="idx_MYINDEX" | bin _time span=1d | stats count as Views by _time,View_Name | fields - count | sort -Views

Result:

TimeStamp ViewName Views (count)

Now i want an average of each different field value in View_Name (in this example, I tryed it for a timespan 1d - not month)

Can someone please help me? I've tryed with "| stats avg(View_Name) but it didn't do what I expected.

Thank you in advance!

Tags (3)
0 Karma

MuS
SplunkTrust
SplunkTrust

Hi tunix,

So here is our co-anser 🙂

MuS suggested this:

index="idx_MYINDEX" | bin _time span=1d | stats count as Views by _time,View_Name | timechart span=1d avg(Views) as avg_Views by View_Name

this should give you the result you expect

tunix replied and used this:
Thanks for help - this works for me..

index="idx_MYINDEX" | bin _time span=1d | stats count as Views by _time,View_Name | stats avg(Views) as avg_Views by View_Name | sort - Views

Cheers, MuS

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...