- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Comparision of hourly Log count by average log count of last 7 days.
phanirohith97
Observer
12-15-2020
09:42 PM
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
scelikok

SplunkTrust
03-04-2021
09:45 AM
Hi @rally0321,
This can be achieved using different approach;
| tstats count where index=some_index earliest=-1d by _time span=1h
| tstats append=t prestats=t count where index= some_index earliest=-7d@d latest=-1d@d by _time span=1h
| table _time count psrsvd_gc
| rename psrsvd_gc AS lastweek_counts
| eventstats avg(lastweek_counts) as weekly_avg
| where count>weekly_avg
If this reply helps you an upvote and "Accept as Solution" is appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
rally0321
Path Finder
03-04-2021
08:38 PM
| tstats count where index=some_index earliest=-1d by _time span=1h
| tstats append=t prestats=t count where index= some_index earliest=-7d@d latest=-1d@d by _time span=1h
| table _time count psrsvd_gc
| rename psrsvd_gc AS lastweek_counts
| eventstats avg(lastweek_counts) as weekly_avg
| where count>weekly_avg
Thanks. I can see result with below change.
1. add prestats=t to 1st tstats
2. where count>weekly_avg need change as lastweek_counts>weekly_avg
However I see below gap.
1. the average is the average for the past 1 week + today's count.
2. the result include past 1 week record in case any hour of last week is > average.
We expect to have below result.
1. the average is the average for the past 1 week only
2. the result include today's entry only.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
scelikok

SplunkTrust
12-15-2020
11:03 PM
@phanirohith97, please try below query;
| tstats count where index=some_index earliest=-1d by _time span=1h
| where count >
[| tstats count where index=some_index earliest=-7d@d latest=-1d@d by _time span=1h
| stats avg(count) as count
| rename count as search]
If this reply helps you an upvote and "Accept as Solution" is appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
rally0321
Path Finder
03-04-2021
05:32 AM
| tstats count where index=some_index earliest=-1d by _time span=1h | where count > [| tstats count where index=some_index earliest=-7d@d latest=-1d@d by _time span=1h | stats avg(count) as count | rename count as search]
Hi,
How can we show the average count in the result as well? I refer to value of search. Thanks.
_time count
1 2021-03-04 09:00:00 491
