Splunk Search

Trying to find events greater than the average wtih streamstats

pp_mills
New Member

Hi Guru's. I am trying to find events greater than the average of the last 10. I also want to display my results in a table. It doesn't work.
Here is my search string.

index="mydata" |streamstats avg(totalms) as myavg current=f window=10|search totalms>myavg |table totalms myavg

Tags (1)
0 Karma

bwooden
Splunk Employee
Splunk Employee

In this case, you may get better results using the where command which uses eval expressions to filter results.

index="mydata" 
  | streamstats avg(totalms) as myavg current=f window=10 
  | where totalms>myavg 
  | table totalms myavg
0 Karma

pp_mills
New Member

That worked perfectly!
thanks so much. My wife thanks you too. I get to go home now 🙂

0 Karma
Get Updates on the Splunk Community!

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...