Create reports that display summary statistics
This topic discusses using the stats and eventstats transforming commands to create reports that display summary statistics related to a field.
The stats and eventstats commands
The eventstats
command works in exactly the same manner as the stats
command, except that the aggregation results of the command are added inline to each event, and only the aggregations that are pertinent to each event.
Using split-by clauses
To fully utilize the stats
command, you need to include a "split by" clause. For example, the following report won't provide much information:
sourcetype=access_combined | stats avg(kbps)
It gives you the average of kbps
for all events with a sourcetype of access_combined
--a single value. The resulting column chart contains only one column.
But if you break out the report with a split by field, Splunk software generates a report that breaks down the statistics by that field. The following report generates a column chart that sorts through the access_combined
logs to get the average thruput (kbps), broken out by host:
sourcetype=access_combined | stats avg(kbps) by host
Examples
Example 1: Create a report that shows you the CPU utilization of Splunk processes, sorted in descending order:
index=_internal "group=pipeline" | stats sum(cpu_seconds) by processor | sort sum(cpu_seconds) desc
Example 2: Create a report to display the average kbps for all events with a sourcetype of access_combined
, broken out by host.
You specify the field name for the eventstats
results by adding the as
argument. So the first example above could be restated with "avgkbps" being the name of the new field that contains the results of the eventstats avg(kbps)
operation:
sourcetype=access_combined | eventstats avg(kbps) as avgkbps by host
When you run this set of commands, Splunk software adds a new avgkbps
field to each sourcetype=access_combined
event that includes the kbps
field. The value of avgkbps
is the average kbps for that event.
Visualize field value highs and lows | Look for associations, statistical correlations, and differences in search results |
This documentation applies to the following versions of Splunk® Enterprise: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.13, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.10, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 7.2.10, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6, 7.3.7, 7.3.8, 7.3.9, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.5, 8.1.6, 8.1.7, 8.1.8, 8.1.9, 8.1.11, 8.2.0, 8.2.1, 8.2.2, 8.2.3, 8.2.4, 8.2.5, 8.2.6, 8.2.7, 8.2.8, 8.2.9, 8.2.10, 8.2.11, 8.2.12, 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.0.4, 9.0.5, 9.0.6, 9.0.7, 9.0.8, 9.0.9, 9.0.10, 9.1.0, 9.1.1, 9.1.2, 9.1.3, 9.1.4, 9.1.5, 9.1.6, 9.1.7, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.3.0, 9.3.1, 9.3.2, 8.1.10, 8.1.12, 8.1.13, 8.1.14
Feedback submitted, thanks!