Splunk Search

List above average values

geoff_still
Engager

Hi Folks.

I'm not experienced with Splunk but have gone through the Search tutorial and have checked this blog trying to find someone with a similar issue with no luck.

I'm looking at trying to show values that are above the average of the same set of values.
The first bit I'm doing is ... | top src limit=0 countfield=MAX which works fine.
The second bit I'm doing is ... | top src limit=0 countfield=MAX | stats avg(MAX) as AVG which works fine and gives me the average of MAX.

What I'm then trying to do is compare MAX to AVG and only show those MAX value which are higher than AVG. The following search doesn't work but it kind of shows what I'm trying to do.
...top src limit=0 countfield=MAX | stats avg(MAX) as AVG | where MAX>AVG

I think the issue is that the stats avg command is filtering out the MAX results, so there's nothing left for the "where" at the end. Once I get this working, I'll probably use something like "anomalies" to just show MAX values a particular distance from AVG.

Tags (1)
0 Karma
2 Solutions

Drainy
Champion

Well, another way you could spin this is to do something like;

| stats max(metric) as MAX, avg(metric) as AVG

And then stick your where/filter after that

View solution in original post

geoff_still
Engager

Thanks Drainy, as the metrics not a number but an IP address I don't think that's going to work for me as is, but it may have shown me the way. I've combined my search and your suggestion to get:
top metric limit=0 countfield=MAX | stats max(MAX), avg(MAX) as AVG

It's not what I was originally aiming for as "top" gives me a list and max just gives me the highest value, but I'm actually mostly interested in that highest value and its distance from the average. Thanks!

View solution in original post

0 Karma

geoff_still
Engager

Thanks Drainy, as the metrics not a number but an IP address I don't think that's going to work for me as is, but it may have shown me the way. I've combined my search and your suggestion to get:
top metric limit=0 countfield=MAX | stats max(MAX), avg(MAX) as AVG

It's not what I was originally aiming for as "top" gives me a list and max just gives me the highest value, but I'm actually mostly interested in that highest value and its distance from the average. Thanks!

0 Karma

Drainy
Champion

Well, another way you could spin this is to do something like;

| stats max(metric) as MAX, avg(metric) as AVG

And then stick your where/filter after that

Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...