I am new to Splunk so pardon me if my question is too naive. I want to set up a Splunk alert if the average of a field is above a threshold. My search is as follows:
sourcetype="somesourcetype" search phase | stats avg(f1) as Average
If I use
sourcetype="somesourcetype" search phase | timechart avg(f1) as Average span=1h
I can see the table listing the average of field f1. But with stats avg(f1)
I do not get anything under statistics panel and I am not sure how to set up an alert if average of f1 is above 100ms.