<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with timecharts in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236167#M70151</link>
    <description>&lt;P&gt;Rich, here are a couple of event: &lt;/P&gt;

&lt;P&gt;Mar  4 06:00:50 192.168.15.125 Mar  4 06:00:01 S14945214214616 - -: CEF:0|Vectra Networks|Vectra|2.3|hsc|Host Score Change|3|externalId=5084 cat=HOST SCORING shost=BThomas-Win7 src=192.168.111.3 dst=192.168.111.3 flexNumber1=84 flexNumber1Label=risk cs4=&lt;A href="https://192.168.15.125/hosts/5084"&gt;https://192.168.15.125/hosts/5084&lt;/A&gt; cs4Label=URL start=1457100001073 end=1457100001073&lt;/P&gt;

&lt;P&gt;Mar  4 03:00:50 192.168.15.125 Mar  4 03:00:01 S14945214214616 - -: CEF:0|Vectra Networks|Vectra|2.3|hsc|Host Score Change|3|externalId=5086 cat=HOST SCORING shost=WSmith_WinPC src=192.168.111.2 dst=192.168.111.2 flexNumber1=64 flexNumber1Label=risk cs4=&lt;A href="https://192.168.15.125/hosts/5086"&gt;https://192.168.15.125/hosts/5086&lt;/A&gt; cs4Label=URL start=1457089201104 end=1457089201104&lt;/P&gt;</description>
    <pubDate>Wed, 09 Mar 2016 19:02:43 GMT</pubDate>
    <dc:creator>cjohnson_vectra</dc:creator>
    <dc:date>2016-03-09T19:02:43Z</dc:date>
    <item>
      <title>Help with timecharts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236162#M70146</link>
      <description>&lt;P&gt;New to splunk so aplogies if this question is not worded correctly. Trying to generate a view (sparkline?) that compares the cumulative value of events over a given period with the current value.  I have a query in place the will show me the count of events that happened each day based on the defined time period:&lt;/P&gt;

&lt;P&gt;index=*  name="event type" | dedup src | timechart count&lt;/P&gt;

&lt;P&gt;but now I want to generate a sparkline that compares the total count with the current value day's value. This will be presented in a single value field. &lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 19:06:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236162#M70146</guid>
      <dc:creator>cjohnson_vectra</dc:creator>
      <dc:date>2016-03-08T19:06:15Z</dc:date>
    </item>
    <item>
      <title>Re: Help with timecharts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236163#M70147</link>
      <description>&lt;P&gt;Could you provide more details on expected output?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 22:43:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236163#M70147</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-03-08T22:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: Help with timecharts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236164#M70148</link>
      <description>&lt;P&gt;Actually, I think I over simplified my question which is why I am having such a hard time getting my arms around this problem. In my case, the "event type" is actually a state that can change at any given time. (i.e. machine x changed from state 'a' to state 'b')&lt;/P&gt;

&lt;P&gt;So I just realized that part of my problem is that I am deduping which eliminates all events except for the final state change. This in combination of the idea that I am not keeping a running tally for each day, I don't see an easy way to track trends.&lt;/P&gt;

&lt;P&gt;In the end, what I was hoping to accomplish was show trends in change in state over a period of time. I just need to rethink this a little.&lt;/P&gt;

&lt;P&gt;Thanks for the response. Greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 00:59:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236164#M70148</guid>
      <dc:creator>cjohnson_vectra</dc:creator>
      <dc:date>2016-03-09T00:59:04Z</dc:date>
    </item>
    <item>
      <title>Re: Help with timecharts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236165#M70149</link>
      <description>&lt;P&gt;Sure, that all sounds like fun.  We may still be able to help if you could provide a few sample events  - I think you are clear enough on your description above that with those two things a start could be made.  Sometimes that's all it takes to get your own juices flowing...&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 01:40:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236165#M70149</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2016-03-09T01:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: Help with timecharts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236166#M70150</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;
Try this search code&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* name="event type" | dedup src | timechart count as Total_count|appendcols[search index=* name="event type" | dedup src | timechart span=1d count as daily_count]|eval diff=Total_count-daily_count|stats sparkline count(diff)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 09 Mar 2016 09:00:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236166#M70150</guid>
      <dc:creator>chimell</dc:creator>
      <dc:date>2016-03-09T09:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Help with timecharts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236167#M70151</link>
      <description>&lt;P&gt;Rich, here are a couple of event: &lt;/P&gt;

&lt;P&gt;Mar  4 06:00:50 192.168.15.125 Mar  4 06:00:01 S14945214214616 - -: CEF:0|Vectra Networks|Vectra|2.3|hsc|Host Score Change|3|externalId=5084 cat=HOST SCORING shost=BThomas-Win7 src=192.168.111.3 dst=192.168.111.3 flexNumber1=84 flexNumber1Label=risk cs4=&lt;A href="https://192.168.15.125/hosts/5084"&gt;https://192.168.15.125/hosts/5084&lt;/A&gt; cs4Label=URL start=1457100001073 end=1457100001073&lt;/P&gt;

&lt;P&gt;Mar  4 03:00:50 192.168.15.125 Mar  4 03:00:01 S14945214214616 - -: CEF:0|Vectra Networks|Vectra|2.3|hsc|Host Score Change|3|externalId=5086 cat=HOST SCORING shost=WSmith_WinPC src=192.168.111.2 dst=192.168.111.2 flexNumber1=64 flexNumber1Label=risk cs4=&lt;A href="https://192.168.15.125/hosts/5086"&gt;https://192.168.15.125/hosts/5086&lt;/A&gt; cs4Label=URL start=1457089201104 end=1457089201104&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 19:02:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-timecharts/m-p/236167#M70151</guid>
      <dc:creator>cjohnson_vectra</dc:creator>
      <dc:date>2016-03-09T19:02:43Z</dc:date>
    </item>
  </channel>
</rss>

