Splunk Search

summing two event counts by source

umplebyj
Explorer

so, I am trying to parse out syslog stats data, trying to get a velocity of the events to figure out which log source is spiking when backlogs occur.

events: the count of events for a particular source type
src: the individual device sending logs to the syslog server.

as syslog stats don't reset until syslog is hup'd or otherwise restarted taking the list of events isn't specifically helpful.

So what I'm trying to figure out is how to get a velocity of trying to get something like: stats min(events, by source) and compare it to a stats max(events) by src. However I haven't been able to combine this properly.

Output would preferably be a table that has (src, maxevents, minevents, diff)

Tags (2)
0 Karma
1 Solution

aholzer
Motivator

I think what you are looking for is
| stats min(events) as min_events max(events) as max_events by src
| eval diff = max_events - min_events

Hope this helps

View solution in original post

aholzer
Motivator

I think what you are looking for is
| stats min(events) as min_events max(events) as max_events by src
| eval diff = max_events - min_events

Hope this helps

umplebyj
Explorer

Could have sworn I tried something just like this and it somehow took the max of all sources and min of all sources (even though I through in the by source field)

Anyways, thanks this worked.

0 Karma
Get Updates on the Splunk Community!

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

A Guide To Cloud Migration Success

As enterprises’ rapid expansion to the cloud continues, IT leaders are continuously looking for ways to focus ...

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...