Splunk Search

How to calculate Anomalies for a particular field?

pavanae
Builder

Considering a field "user_name". What could be the search to find the anomalies per hour for each user_name in a day?

0 Karma
1 Solution

somesoni2
Revered Legend

Give this a try

your base search | bucket span=1h _time | stats count by _time user_name | eventstats stdev(count) as stdev by user_name | where count>Your_MultiplicationFactor*stdev

View solution in original post

somesoni2
Revered Legend

Give this a try

your base search | bucket span=1h _time | stats count by _time user_name | eventstats stdev(count) as stdev by user_name | where count>Your_MultiplicationFactor*stdev
Get Updates on the Splunk Community!

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...

Detecting Remote Code Executions With the Splunk Threat Research Team

WATCH NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, ...

Enter the Dashboard Challenge and Watch the .conf24 Global Broadcast!

The Splunk Community Dashboard Challenge is still happening, and it's not too late to enter for the week of ...