Splunk Search

average count events

Shark2112
Communicator

Hey guys.

I need to know what ip have less events then avarage of all devices.

for example:
ip events
1.1.1.1 11
2.2.2.2 10
3.3.3.3 9
4.4.4.4 1

so average is 7.75 and i want to find ip 4.4.4.4

Tags (1)
0 Karma
1 Solution

javiergn
Super Champion

Eventstats is your friend. Assuming your fields are named IP and events:

| eventstats avg(events) as avg_events
| where events < avg_events

View solution in original post

javiergn
Super Champion

Eventstats is your friend. Assuming your fields are named IP and events:

| eventstats avg(events) as avg_events
| where events < avg_events
Get Updates on the Splunk Community!

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...