<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to alert in Difference in count of two search query in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/how-to-find-difference-between-two-quot-stats-count-quot-used-in/m-p/535366#M151298</link>
    <description>&lt;P&gt;("SSO Initiated" OR "SSO Completed") | stats count(eval(searchmatch("SSO Initiated"))) as SSO_Initiated count(eval(searchmatch("SSO Completed"))) as SSO_Completed | eval Difference=SSO_Initiated-SSO_Completed&lt;/P&gt;&lt;P&gt;I want to create alert if Difference &amp;gt; 0, then mail needs to be sent.&amp;nbsp; This check should keep happening every 15 minute and check in last 15 minute if Difference &amp;gt; 0, then trigger mail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Jan 2021 16:04:36 GMT</pubDate>
    <dc:creator>icenitesh</dc:creator>
    <dc:date>2021-01-11T16:04:36Z</dc:date>
    <item>
      <title>how to find difference between two "stats count" used in two different saved search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-find-difference-between-two-quot-stats-count-quot-used-in/m-p/36193#M8041</link>
      <description>&lt;P&gt;So i have two saved search queries&lt;BR /&gt;
 1. sourcetype="x" "attempted" source="y" | stats count&lt;BR /&gt;
 2. sourcetype="x" "Failed" source="y" | stats count&lt;/P&gt;

&lt;P&gt;i need to create a search query which will calculate &lt;/P&gt;

&lt;P&gt;Passed item = (sourcetype="x" "attempted" source="y" | stats count) - (sourcetype="x" "Failed" source="y" | stats count)&lt;/P&gt;

&lt;P&gt;and display   Passed item count by hours&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2013 18:46:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-find-difference-between-two-quot-stats-count-quot-used-in/m-p/36193#M8041</guid>
      <dc:creator>snabi</dc:creator>
      <dc:date>2013-08-15T18:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: how to find difference between two "stats count" used in two different saved search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-find-difference-between-two-quot-stats-count-quot-used-in/m-p/36194#M8042</link>
      <description>&lt;P&gt;give this a shot:&lt;BR /&gt;
sourcetype="x" | stats count(eval(searchmatch("attempted"))) AS numattempts count(eval(searchmatch("Failed"))) AS numfails | eval diff=numattempts-numfails&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2013 12:24:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-find-difference-between-two-quot-stats-count-quot-used-in/m-p/36194#M8042</guid>
      <dc:creator>starcher</dc:creator>
      <dc:date>2013-08-16T12:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: how to find difference between two "stats count" used in two different saved search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-find-difference-between-two-quot-stats-count-quot-used-in/m-p/36195#M8043</link>
      <description>&lt;P&gt;sourcetype="x" source="x.log" ("consolidation succeeded" OR "conversion failed") | stats count(eval(searchmatch("consolidation succeeded"))) as attempts count(eval(searchmatch("xconversion failed"))) as failures | eval successes=attempts-failures&lt;/P&gt;

&lt;P&gt;this one worked for me...&lt;BR /&gt;
Thanks for all the supports &lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2013 20:30:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-find-difference-between-two-quot-stats-count-quot-used-in/m-p/36195#M8043</guid>
      <dc:creator>snabi</dc:creator>
      <dc:date>2013-08-26T20:30:50Z</dc:date>
    </item>
    <item>
      <title>How to alert in Difference in count of two search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-find-difference-between-two-quot-stats-count-quot-used-in/m-p/535366#M151298</link>
      <description>&lt;P&gt;("SSO Initiated" OR "SSO Completed") | stats count(eval(searchmatch("SSO Initiated"))) as SSO_Initiated count(eval(searchmatch("SSO Completed"))) as SSO_Completed | eval Difference=SSO_Initiated-SSO_Completed&lt;/P&gt;&lt;P&gt;I want to create alert if Difference &amp;gt; 0, then mail needs to be sent.&amp;nbsp; This check should keep happening every 15 minute and check in last 15 minute if Difference &amp;gt; 0, then trigger mail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 16:04:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-find-difference-between-two-quot-stats-count-quot-used-in/m-p/535366#M151298</guid>
      <dc:creator>icenitesh</dc:creator>
      <dc:date>2021-01-11T16:04:36Z</dc:date>
    </item>
  </channel>
</rss>

