Splunk Search

How can I count the difference from two days?

jfriedrich
New Member

Hi Splunk colleagues,

I need the following output:
Day 1 difference to Day2 = + or - in counts to see the trend of errormessages.

It is a multitude of times in the timerange to select and then by eye to compare the numbers...

My Search for today is following:

    * | chart count by sourcetype, ERRORCODE | sort -count

Day 1: (for example today)

sourcetype  ERRORCODE2  ERRORCODE2  ERRORCODE3
WIN32   0   0   138
UNIX    0   0      60
AUTO    0   0     844
LDAP    0   24   703

Day 2:

sourcetype  ERRORCODE2  ERRORCODE2  ERRORCODE3
WIN32   5   0   138
UNIX    0   0      60
AUTO    0   8      0
LDAP    1   24  100
0 Karma

oda
Communicator

Is the error code correct?
You can make it if you have decided.

  • | eval test=sourcetype+"__"+ERRORCODE | bucket _time span=1d | chart count by _time,test | sort -count | delta | delta …

Try it!

0 Karma

somesoni2
Revered Legend

Can you post expected output based on the sample data you posted in question?

0 Karma

jfriedrich
New Member

I am open for suggestions maybe the result can be:
math: (day1count - day2count) = daycountdifference

day1count: 15
day2count: 20
daycountdifference: -5

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...