Splunk Search

timechart comparing event count

mcbradford
Contributor

I want to create a time chart (line) based on the count of events for the past 24 hours, and one week earlier same day and same time period

I can create a time chart using the following:

index=myindex | timechart count

I know I can the previous week by using the following:

index=myindex earliest-7d@h latest -6d@h

How do I create a line chart using the values for the past 24 hours and the values from the previous week?

What will the search be?

Tags (2)
0 Karma

lguinn2
Legend

There is a very similar discussion at this thread:

Comparing today's data with last week's data

The technique that fpigeon uses is fine - but he ran into problems because of the volume of data. I thought it might be easier to take a look there than to run through it here.

But if you still have issues, can you give more details on the searches that you want to run?

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...