Splunk Search

Trying to find events greater than the average wtih streamstats

pp_mills
New Member

Hi Guru's. I am trying to find events greater than the average of the last 10. I also want to display my results in a table. It doesn't work.
Here is my search string.

index="mydata" |streamstats avg(totalms) as myavg current=f window=10|search totalms>myavg |table totalms myavg

Tags (1)
0 Karma

bwooden
Splunk Employee
Splunk Employee

In this case, you may get better results using the where command which uses eval expressions to filter results.

index="mydata" 
  | streamstats avg(totalms) as myavg current=f window=10 
  | where totalms>myavg 
  | table totalms myavg
0 Karma

pp_mills
New Member

That worked perfectly!
thanks so much. My wife thanks you too. I get to go home now 🙂

0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...