Splunk Search

Difference bewteen two variable date reports, considering the direction

ABurk
New Member

Hello,

I'm trying to create a search that shows what results are missing today - a, compared to yesterday - b.
a and b are inputs on a dashbaord so I could also compare 2 weeks ago with today.
I can't do a "search of today NOT [subsearch with results from yesterday] because I need to use | operations before.
It feels like a simple problem that for sure was solved 100 times but I don't get it.
What I have so far is only the difference, but it also shows if something new was added today, but was not there yesterday.

index=myindex sourcetype=special_list
| eval deleted=case(Deleted="Yes", "Deleted", Deleted="No", "Active")
| eval date=strftime(_time, "%F")
| where date="2019-09-27" OR date="2019-09-26"
| stats count as Total by FullName
| where Total=1

Example:
Compare 2019-09-22

  • A
  • B
  • C
  • D

with 2019-09-27

  • A
  • B
  • D

Result: C

Any help highly appreciated
Cheers

0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi ABurk,
try something like this

 index=myindex sourcetype=special_list
 | eval deleted=case(Deleted="Yes", "Deleted", Deleted="No", "Active")
 | eval date=strftime(_time, "%F")
 | where date="2019-09-27" OR date="2019-09-26"
 | stats values(date) AS date count as Total by FullName
 | where Total=1 AND date="2019-09-27"

if it doesn't run use "search" instead "where".

Bye.
Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi ABurk,
try something like this

 index=myindex sourcetype=special_list
 | eval deleted=case(Deleted="Yes", "Deleted", Deleted="No", "Active")
 | eval date=strftime(_time, "%F")
 | where date="2019-09-27" OR date="2019-09-26"
 | stats values(date) AS date count as Total by FullName
 | where Total=1 AND date="2019-09-27"

if it doesn't run use "search" instead "where".

Bye.
Giuseppe

ABurk
New Member

Thanks for the answer, I used

index=myindex sourcetype=special_list
| eval date=strftime(_time, "%F") 
| where date like "2019-09-27"
| search NOT
    [search index=myindex sourcetype=special_list
    | eval date=strftime(_time, "%F")
    | where date like "2019-09-26"
    | eventstats count by FullName
    | table FullName] 
| eventstats count by FullName
| table FullName, Path

I think I did some syntax wrong with the |search in the past because I'm sure I tried before..

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi ABurk,
Your search should correctly run if you're sure that your subsearch has less than 50,000 results.

Bye, see next time.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...