Splunk Search

how to get the max and min for a combination of multiple fields ?

vadud3
Path Finder
* | rex "(?<fpc>fpc\d+) (?<ichip>ICHIP\(\d+\)):Packet drop in Ichip pktwr,rate: %\S+: \d+, total: (?<err>\d+)"

How do I get the max(err) and min(err) for each combination of host, fpc, ichip ?

err is an integer number.

Tags (3)
0 Karma

ziegfried
Influencer
<your search> | stats max(err) min(err) by host,fpc,ichip

edit:

* | stats max(err) as max_err min(err) as min_err by host,fpc,ichip | eval rate=(max_err-min_err)/720 | fields - max_err min_err | sort -rate

ziegfried
Influencer

added to the answer

0 Karma

vadud3
Path Finder

how do I sort it by host with highest rate ? rate is (max(err) - min(err)) / 720

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...