Splunk Search

Search to identify the most volatile values in a field

luke222010
Engager

Hello Splunkers!

I have the following fields being populated by 1000s of values every 1 minute:

Name Cost

E.g.
Luke 1.25
Luke 1.22
Dave 2.45
Dave 2.57

Bearing in mind, there are over 1000 Cost values coming in for each Name each minute, I want to identify the biggest movers in terms of Cost over a 5 minute period thereby identifying the most volatile Names in a timechart.

Can anyone tell me how I would do this please?

0 Karma

woodcock
Esteemed Legend

Like this:

... earliest=-5m latest=now | stats range(Cost) AS volatility BY Name
| sort 0 - volatility

Also maybe this:

... earliest=-24h latest=now | streamstats time_window=5m range(Cost) AS volatility BY Name
| sort 0 - volatility
0 Karma

to4kawa
Ultra Champion

1000s of values?
I don't understand 1.25 is 1000s of values.

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...