Splunk Search

Stats extract

nikhilmehra79
Path Finder

I have 3 values extracted from a search Value 1 ,2, and 3

I know i can use stats avg(Value1) by Value3 to get a nice table but how can i throw in Value2 also in a mix.

I wand table with Value 1, Value 2 by Value 3
eg :
Uptime, downtime by Hostname

Tags (4)
0 Karma
1 Solution

lguinn2
Legend

Try

| stats avg(Value1) avg(Value2) by Value3

or whatever you like!

View solution in original post

lguinn2
Legend

Try

| stats avg(Value1) avg(Value2) by Value3

or whatever you like!

Get Updates on the Splunk Community!

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...

Splunk Enterprise Security: Your Command Center for PCI DSS Compliance

Every security professional knows the drill. The PCI DSS audit is approaching, and suddenly everyone's asking ...

Developer Spotlight with Guilhem Marchand

From Splunk Engineer to Founder: The Journey Behind TrackMe    After spending over 12 years working full time ...