Splunk Search

How to calculate Anomalies for a particular field?

pavanae
Builder

Considering a field "user_name". What could be the search to find the anomalies per hour for each user_name in a day?

0 Karma
1 Solution

somesoni2
Revered Legend

Give this a try

your base search | bucket span=1h _time | stats count by _time user_name | eventstats stdev(count) as stdev by user_name | where count>Your_MultiplicationFactor*stdev

View solution in original post

somesoni2
Revered Legend

Give this a try

your base search | bucket span=1h _time | stats count by _time user_name | eventstats stdev(count) as stdev by user_name | where count>Your_MultiplicationFactor*stdev
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...