Splunk Search

How to search the list of devices that have sent logs the past 30 days, but not within the last 24 hours?

sumit29
Path Finder

Dear Experts,

I am looking to find the difference in the devices sending logs in the last 24 hour with devices which sent logs 30 days back.

Search:

| tstats values(host) AS Host dc(host) as count by sourcetype,index | eval sourcetype=sourcetype." - ".count | stats list(sourcetype) as "sourcetype-hostCount" by index, Host 

Lets say for the ast 24 hours, it list 40 devices, and for last 30 days it list 60 devices.

I need an output of the difference which should list the 20 devices which are not sending logs from the past 1 day.

Tags (3)
0 Karma

lguinn2
Legend

Try this

| tstats count latest(_time) as latest by host sourcetype index
| eval last24hours=if(latest>=relative_time(now(),"-24h"),"Yes","No")
| eval last30days=if(latest>=relative_time(now(),"-30d"),"Yes","No")
| where last30days="Yes" and last24hours="No"
| stats list(sourcetype) as sourcetypes list(count) as counts sum(count) as Total by index host
0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...