Splunk Search

Difference bewteen two variable date reports, considering the direction

ABurk
New Member

Hello,

I'm trying to create a search that shows what results are missing today - a, compared to yesterday - b.
a and b are inputs on a dashbaord so I could also compare 2 weeks ago with today.
I can't do a "search of today NOT [subsearch with results from yesterday] because I need to use | operations before.
It feels like a simple problem that for sure was solved 100 times but I don't get it.
What I have so far is only the difference, but it also shows if something new was added today, but was not there yesterday.

index=myindex sourcetype=special_list
| eval deleted=case(Deleted="Yes", "Deleted", Deleted="No", "Active")
| eval date=strftime(_time, "%F")
| where date="2019-09-27" OR date="2019-09-26"
| stats count as Total by FullName
| where Total=1

Example:
Compare 2019-09-22

  • A
  • B
  • C
  • D

with 2019-09-27

  • A
  • B
  • D

Result: C

Any help highly appreciated
Cheers

0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi ABurk,
try something like this

 index=myindex sourcetype=special_list
 | eval deleted=case(Deleted="Yes", "Deleted", Deleted="No", "Active")
 | eval date=strftime(_time, "%F")
 | where date="2019-09-27" OR date="2019-09-26"
 | stats values(date) AS date count as Total by FullName
 | where Total=1 AND date="2019-09-27"

if it doesn't run use "search" instead "where".

Bye.
Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi ABurk,
try something like this

 index=myindex sourcetype=special_list
 | eval deleted=case(Deleted="Yes", "Deleted", Deleted="No", "Active")
 | eval date=strftime(_time, "%F")
 | where date="2019-09-27" OR date="2019-09-26"
 | stats values(date) AS date count as Total by FullName
 | where Total=1 AND date="2019-09-27"

if it doesn't run use "search" instead "where".

Bye.
Giuseppe

ABurk
New Member

Thanks for the answer, I used

index=myindex sourcetype=special_list
| eval date=strftime(_time, "%F") 
| where date like "2019-09-27"
| search NOT
    [search index=myindex sourcetype=special_list
    | eval date=strftime(_time, "%F")
    | where date like "2019-09-26"
    | eventstats count by FullName
    | table FullName] 
| eventstats count by FullName
| table FullName, Path

I think I did some syntax wrong with the |search in the past because I'm sure I tried before..

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi ABurk,
Your search should correctly run if you're sure that your subsearch has less than 50,000 results.

Bye, see next time.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...