Splunk Search

timechart comparing event count

mcbradford
Contributor

I want to create a time chart (line) based on the count of events for the past 24 hours, and one week earlier same day and same time period

I can create a time chart using the following:

index=myindex | timechart count

I know I can the previous week by using the following:

index=myindex earliest-7d@h latest -6d@h

How do I create a line chart using the values for the past 24 hours and the values from the previous week?

What will the search be?

Tags (2)
0 Karma

lguinn2
Legend

There is a very similar discussion at this thread:

Comparing today's data with last week's data

The technique that fpigeon uses is fine - but he ran into problems because of the volume of data. I thought it might be easier to take a look there than to run through it here.

But if you still have issues, can you give more details on the searches that you want to run?

0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...