Knowledge Management

collect command - count value changing with time.

Path Finder

Hi All, 

I have created a scheduled reports (its not accelerated or summary indexed) and event count is populated into another index via collect command: 

index=xxxx host=yyyyy| stats count
| addinfo
| eval _time = info_min_time
| collect index=xyz_summary sourcetype="Trip Plans Other Apps" addTime=T

please note:

- the indexname contains summary but this index is not a summary index. 

- Report runs at morning 7 o'clock for the previous day's data and the _time is overwritten to previous date. This is done so that the count is logged in as previous day's data.  

The issue which we are facing here is when we run the same query for that time period after a few days( say a month), we are observing the value inside the index=xyz_summary (i.e. count value) is greater than when we run the original query. Interestingly, the results were both the same, when I ran both queries initially a month before.  

Any suggestions why is this happening (is it due to collect command) ? what modification can be done so that we dont get a mismatch here.    

Thanks in advance. 

Kind regards




Labels (2)
0 Karma
Get Updates on the Splunk Community!

SplunkTrust | Where Are They Now - Michael Uschmann

The Background Five years ago, Splunk published several videos showcasing members of the SplunkTrust to share ...

Admin Your Splunk Cloud, Your Way

Join us to maximize different techniques to best tune Splunk Cloud. In this Tech Enablement, you will get ...

Cloud Platform | Discontinuing support for TLS version 1.0 and 1.1

Overview Transport Layer Security (TLS) is a security communications protocol that lets two computers, ...