Splunk Search

avg of number of events by day

pinzer
Path Finder

Hi all, i need to search the average number from the count by day of an event.

for example if i have 3 5 and 4 events in three different days i need the average that is 4.

the eventtype is

eventtype="searchAccountLocked"

i need also to use rangemap in my search...to control if the number of events of today is higher than the average. I'm using this search queri that doesn't work


eventtype="searchAccountLocked" | stats count as count2 | timechart span=1d count | stats avg(count) |rangemap field=count2 green=1-count2 red=count2-50000 default=gray

please help me! 🙂

Tags (2)
1 Solution

ziegfried
Influencer
eventtype="searchAccountLocked" | timechart span=1d count | stats avg(count)

or

eventtype="searchAccountLocked" | bucket span=1d _time | stats count by _time | stats avg(count)

View solution in original post

ziegfried
Influencer

You won't be able to use the rangemap command for this purpose. But you can use the eval command to do so:

eventtype="searchAccountLocked" | timechart span=1d count | stats last(count) as today_count avg(count) as avg_count | eval range=if(today_count>avg_count, "red", "green")

Documentation on the eval command: http://www.splunk.com/base/Documentation/latest/SearchReference/Eval

pinzer
Path Finder

Perfect! thanks a lot! Really good work!

0 Karma

ziegfried
Influencer
eventtype="searchAccountLocked" | timechart span=1d count | stats avg(count)

or

eventtype="searchAccountLocked" | bucket span=1d _time | stats count by _time | stats avg(count)

ziegfried
Influencer

I've added a separate answer for the solution.

0 Karma

pinzer
Path Finder

i need also to use rangemap in my search...to control if the number of events of today is higher than the average. I'm using this search queri that doesn't work

eventtype="searchAccountLocked" | stats count as count2 | timechart span=1d count | stats avg(count) |rangemap field=count2 green=1-count2 red=count2-50000 default=gray

please help me! 🙂

0 Karma

pinzer
Path Finder

thanks a lot! Good work!

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Enhance Security Operations with Automated Threat Analysis in the Splunk EcosystemAre you leveraging ...

What Is Splunk? Here’s What You Can Do with Splunk

Hey Splunk Community, we know you know Splunk. You likely leverage its unparalleled ability to ingest, index, ...

Level Up Your .conf25: Splunk Arcade Comes to Boston

With .conf25 right around the corner in Boston, there’s a lot to look forward to — inspiring keynotes, ...